<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cybertron</provider_name><provider_url>https://cybertron.co.th/en/</provider_url><author_name>webmaster</author_name><author_url>https://cybertron.co.th/en/author/webmaster/</author_url><title>&gt;&gt;CyberSquad - Cybertron</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="emeV1Cb3Xm"&gt;&lt;a href="https://cybertron.co.th/en/cybersquad/"&gt;&gt;&gt;CyberSquad&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://cybertron.co.th/en/cybersquad/embed/#?secret=emeV1Cb3Xm" width="600" height="338" title="&#x201C;&gt;&gt;CyberSquad&#x201D; &#x2014; Cybertron" data-secret="emeV1Cb3Xm" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l&lt;n.length;l++)n[l].style.display="none";for(l=0;l&lt;i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><description>&#xA0;In the situation when organizations are under cyber threat attacks, it could lead to damage or loss of invaluable data of those enterprises, customers, and business partners, also reputation and trust which have been built for years. The effective incident response, which is fast, in time, at the scale of hours or days; is one [&hellip;]</description><thumbnail_url>http://cybertron.co.th/wp-content/uploads/2021/06/1624337969378-3.jpg</thumbnail_url></oembed>
