{"version":"1.0","provider_name":"Forescout","provider_url":"https:\/\/www.forescout.com","author_name":"Greg Liewer","author_url":"https:\/\/www.forescout.com\/blog\/author\/greg-liewer\/","title":"Trusting Network Segmentation in Times of Distress - Forescout","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"I5JgIrMmVP\"><a href=\"https:\/\/www.forescout.com\/blog\/trusting-network-segmentation-in-times-of-distress\/\">Trusting Network Segmentation in Times of Distress<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.forescout.com\/blog\/trusting-network-segmentation-in-times-of-distress\/embed\/#?secret=I5JgIrMmVP\" width=\"600\" height=\"338\" title=\"&#8220;Trusting Network Segmentation in Times of Distress&#8221; &#8212; Forescout\" data-secret=\"I5JgIrMmVP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.forescout.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/05\/Colonial-Pipeline-Attack-Blog-Image_NEW.jpg","thumbnail_width":2134,"thumbnail_height":1170,"description":"Quickly and accurately ensure effective segmentation through traffic visualization The recent Colonial Pipeline cybersecurity incident and subsequent pipeline shutdown highlights the need to limit the blast radius of incidents affecting critical infrastructure. Last year a similar but less-publicized incident occurred when an attacker gained access to a natural gas compression facility\u2019s IT network and then [&hellip;]"}