{"version":"1.0","provider_name":"Insside EN","provider_url":"https:\/\/www.insside.net\/en","author_name":"INSSIDE","author_url":"https:\/\/www.insside.net\/en\/author\/cruiz\/","title":"Blue Team in Cybersecurity: What It Is and How It Works - Insside EN","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VY3jaVz8Hg\"><a href=\"https:\/\/www.insside.net\/en\/blue-team-in-cybersecurity-what-it-is-and-how-it-works\/\">Blue Team in Cybersecurity: What It Is and How It Works<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.insside.net\/en\/blue-team-in-cybersecurity-what-it-is-and-how-it-works\/embed\/#?secret=VY3jaVz8Hg\" width=\"600\" height=\"338\" title=\"&#8220;Blue Team in Cybersecurity: What It Is and How It Works&#8221; &#8212; Insside EN\" data-secret=\"VY3jaVz8Hg\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2024\/06\/Diseno-sin-titulo-2024-06-06T102339.567.png","thumbnail_width":1080,"thumbnail_height":1080,"description":"In the realm of cybersecurity, teams are generally divided into two main categories: Red Team and Blue Team. While the Red Team is responsible for simulating attacks and finding vulnerabilities, the Blue Team focuses on defending and protecting information systems. What is the Blue Team?The Blue Team is a group of cybersecurity professionals dedicated to [...]"}