{"version":"1.0","provider_name":"InprOTech","provider_url":"https:\/\/inprotech.es\/en\/","author_name":"admin","author_url":"https:\/\/inprotech.es\/en\/author\/moon\/","title":"Vulnerability scanners in OT networks: a quick overview - InprOTech","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"8fSMBDvnzk\"><a href=\"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/\">Vulnerability scanners in OT networks: a quick overview<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/embed\/#?secret=8fSMBDvnzk\" width=\"600\" height=\"338\" title=\"&#8220;Vulnerability scanners in OT networks: a quick overview&#8221; &#8212; InprOTech\" data-secret=\"8fSMBDvnzk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/inprotech.es\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Vulnerability-scanners.jpg","thumbnail_width":1536,"thumbnail_height":768,"description":"Cybersecurity has a well-deserved relevance in the operational design of any company. While this is unanimous in IT environments, the case is more complex when it comes to industrial environments. In this brief overview, we will illustrate this with a quick dive into the topic of vulnerability scanners in the context of OT networks."}