{"version":"1.0","provider_name":"ESET Eesti Blogi","provider_url":"https:\/\/blog.eset.ee\/et\/en\/","title":"Fighting post-truth with reality in cybersecurity","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"fWyPn0mbOF\"><a href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/\">Fighting post-truth with reality in cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/embed\/#?secret=fWyPn0mbOF\" width=\"600\" height=\"338\" title=\"&#8220;Fighting post-truth with reality in cybersecurity&#8221; &#8212; ESET Eesti Blogi\" data-secret=\"fWyPn0mbOF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.eset.ee\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_597956915-623x410.jpg","thumbnail_width":623,"thumbnail_height":410,"description":"The world is changing in front of our eyes. Where facts, truth and honesty were once our most valuable assets, nowadays alternative-facts, post-truths and outright lies reign. Unfortunately, the cybersecurity business is no exception to this trend. Even worse, with all the recent advances in the field of artificial intelligence (AI) and machine learning (ML),"}