{"version":"1.0","provider_name":"Learning Hub","provider_url":"https:\/\/clouddirect.net\/learning-hub","author_name":"georgehartrey","author_url":"https:\/\/clouddirect.net\/learning-hub\/author\/georgehartrey\/","title":"A beginner's guide to Zero Trust","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"wgmmVBTjgw\"><a href=\"https:\/\/clouddirect.net\/learning-hub\/a-beginners-guide-to-zero-trust-2\/\">A beginner&#8217;s guide to Zero Trust<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/clouddirect.net\/learning-hub\/a-beginners-guide-to-zero-trust-2\/embed\/#?secret=wgmmVBTjgw\" width=\"600\" height=\"338\" title=\"&#8220;A beginner&#8217;s guide to Zero Trust&#8221; &#8212; Learning Hub\" data-secret=\"wgmmVBTjgw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/clouddirect.net\/learning-hub\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/02\/Beginners-guide-to-Zero-Trust.jpg","thumbnail_width":1600,"thumbnail_height":900,"description":"The rise of hybrid working has completely changed the security perimeter for good. Security perimeters used to be defined by your organisation\u2019s location, as that\u2019s where your desktops, servers and employees were. But in the hybrid workplace, this extends beyond your offices to any access point that hosts, stores, or accesses corporate resources and services. [&hellip;]"}