{"version":"1.0","provider_name":"AEWIN","provider_url":"https:\/\/www.aewin.com\/ko\/","author_name":"aewin","author_url":"https:\/\/www.aewin.com\/ko\/author\/aewin\/","title":"Deploying AI to Optimize Cybersecurity - AEWIN","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Bsj6Z1Rvsk\"><a href=\"https:\/\/www.aewin.com\/ko\/application\/20666\/\">Deploying AI to Optimize Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.aewin.com\/ko\/application\/20666\/embed\/#?secret=Bsj6Z1Rvsk\" width=\"600\" height=\"338\" title=\"&#8220;Deploying AI to Optimize Cybersecurity&#8221; &#8212; AEWIN\" data-secret=\"Bsj6Z1Rvsk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.aewin.com\/wp-content\/uploads\/2024\/03\/Deploying-AI-to-Optimize-Cybersecurity_\u5de5\u4f5c\u5340\u57df-1.jpg","thumbnail_width":1200,"thumbnail_height":628,"description":"Background As cyberattacks become more sophisticated, AI&#8217;s role in defense is expected to be more crucial. Due to fast-evolving cyber threats and data surge, traditional methods are hard to keep pace with them. The integration of AI and machine learning technologies enable advanced cybersecurity solutions with excellent efficiency and enhanced defensing power to deal with [&hellip;]"}