<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>AI Automatizaci&#xF3;n de la seguridad</provider_name><provider_url>https://swimlane.com/es</provider_url><author_name>Cody Cornell</author_name><title>Filling the gap in cybersecurity</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="1yIzDg4XmD"&gt;&lt;a href="https://swimlane.com/es/blog/filling-gap-cyber-security/"&gt;Llenar el vac&#xED;o en ciberseguridad&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://swimlane.com/es/blog/filling-gap-cyber-security/embed/#?secret=1yIzDg4XmD" width="600" height="338" title="&#xAB;Cubrir la brecha en ciberseguridad&#xBB;: Automatizaci&#xF3;n de la seguridad mediante IA" data-secret="1yIzDg4XmD" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://swimlane.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;</html><description>The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained&#x2014;which is why we founded Swimlane.</description><thumbnail_url>https://swimlane.com/wp-content/uploads/Sitewide-OG.png</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>630</thumbnail_height></oembed>
