{"version":"1.0","provider_name":"PC Matic Blog","provider_url":"https:\/\/www.pcmatic.com\/blog","author_name":"chengrob","author_url":"https:\/\/www.pcmatic.com\/blog\/author\/chengrob\/","title":"The World of Computer Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ScgGJC9n2x\"><a href=\"https:\/\/www.pcmatic.com\/blog\/the-world-of-computer-security\/\">The World of Computer Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.pcmatic.com\/blog\/the-world-of-computer-security\/embed\/#?secret=ScgGJC9n2x\" width=\"600\" height=\"338\" title=\"&#8220;The World of Computer Security&#8221; &#8212; PC Matic Blog\" data-secret=\"ScgGJC9n2x\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.pcmatic.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","thumbnail_width":1920,"thumbnail_height":1080,"description":"Thanks for the tremendous response to our last piece analyzing the state of the security industry. We firmly believe that using cloud technology can help us better understand security issues and therefore make better security products. In this edition, we decided to analyze the distinctions between security in different parts of the world. We analyzed which types of security threats were most prevalent by region. We also analyzed which security software was most prevalent by region."}