{"version":"1.0","provider_name":"Urolime Blogs","provider_url":"https:\/\/www.urolime.com\/blogs\/uk","author_name":"Urolime Technologies","author_url":"https:\/\/www.urolime.com\/blogs\/uk\/author\/blogadmin\/","title":"DevSecOps-The Journey from Theory to Practice - Urolime Blogs","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"C5KS2CripY\"><a href=\"https:\/\/www.urolime.com\/blogs\/uk\/devsecops-the-journey-from-theory-to-practice\/\">DevSecOps-The Journey from Theory to Practice<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.urolime.com\/blogs\/uk\/devsecops-the-journey-from-theory-to-practice\/embed\/#?secret=C5KS2CripY\" width=\"600\" height=\"338\" title=\"&#8220;DevSecOps-The Journey from Theory to Practice&#8221; &#8212; Urolime Blogs\" data-secret=\"C5KS2CripY\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png","thumbnail_width":768,"thumbnail_height":432,"description":"DevSecOps has become the new security norm in the DevOps ecosystem. It is easy to understand DevSecOps philosophy but the game changes when you actually start implementing it. There is no specific tool or switch that you can simply flip to achieve DevSecOps."}