<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Forescout</provider_name><provider_url>https://www.forescout.com</provider_url><author_name>Stacy Silva</author_name><author_url>https://www.forescout.com/blog/author/ssilva/</author_url><title>Research Report: Putting Healthcare Security Under The Microscope - Forescout</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="AgspMUyMh1"&gt;&lt;a href="https://www.forescout.com/research-report-putting-healthcare-security-under-the-microscope/"&gt;Research Report: Putting Healthcare Security Under The Microscope&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.forescout.com/research-report-putting-healthcare-security-under-the-microscope/embed/#?secret=AgspMUyMh1" width="600" height="338" title="&#x201C;Research Report: Putting Healthcare Security Under The Microscope&#x201D; &#x2014; Forescout" data-secret="AgspMUyMh1" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.forescout.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Research Report: Putting Healthcare Security Under The Microscope Analysis of Device Data Shines a Light on Cybersecurity Risks in Healthcare This report provides healthcare organizations security and risk management leaders with insight into the types of devices connecting to medical networks, their associated risks and recommendations for a security strategy that goes beyond just securing [&hellip;]</description></oembed>
