{"version":"1.0","provider_name":"Forescout","provider_url":"https:\/\/www.forescout.com","author_name":"Bartosz Urban","author_url":"https:\/\/www.forescout.com\/blog\/author\/bartosz.urbanforescout.com\/","title":"How Can CISOs Effectively Tackle Shadow IT Apps and Reduce Risk in The Cloud? - Forescout","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ie53pHanCp\"><a href=\"https:\/\/www.forescout.com\/blog\/how-can-cisos-effectively-tackle-shadow-it-apps-and-reduce-risk-in-the-cloud\/\">How Can CISOs Effectively Tackle Shadow IT Apps and Reduce Risk in The Cloud?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.forescout.com\/blog\/how-can-cisos-effectively-tackle-shadow-it-apps-and-reduce-risk-in-the-cloud\/embed\/#?secret=ie53pHanCp\" width=\"600\" height=\"338\" title=\"&#8220;How Can CISOs Effectively Tackle Shadow IT Apps and Reduce Risk in The Cloud?&#8221; &#8212; Forescout\" data-secret=\"ie53pHanCp\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.forescout.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/10\/risk-cloud-shadow-it-apps-blog.jpg","thumbnail_width":1024,"thumbnail_height":560,"description":"Most administrators admit they only see a small portion of the apps that users actually access in the cloud. This lack of visibility is dangerous and leaves networks and data in an unnecessary state of vulnerability. Our article explains how to address the challenges of shadow IT head-on"}