{"version":"1.0","provider_name":"AI-Sicherheitsautomatisierung","provider_url":"https:\/\/swimlane.com\/de","author_name":"Katie Bykowski","title":"AI Security Governance Insights from Security Leaders | Swimlane","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"iin5LlbMtb\"><a href=\"https:\/\/swimlane.com\/de\/blog\/ai-security-governance-insights\/\">Einblicke in die KI-Sicherheitsgovernance von Sicherheitsexperten<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/swimlane.com\/de\/blog\/ai-security-governance-insights\/embed\/#?secret=iin5LlbMtb\" width=\"600\" height=\"338\" title=\"\u201eEinblicke f\u00fchrender Sicherheitsexperten in die KI-Sicherheitsgovernance\u201c \u2013 KI-Sicherheitsautomatisierung\" data-secret=\"iin5LlbMtb\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/swimlane.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-3-1024x535.png","thumbnail_width":1024,"thumbnail_height":535,"description":"Explore key insights on AI security governance from 500 cybersecurity leaders. Learn about AI\u2019s role in cybersecurity, vendor and government responsibility, and how to navigate the AI hype. Download the full report for more findings."}