<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>7layers</provider_name><provider_url>https://www.7layers.com/en/</provider_url><author_name>Janett</author_name><author_url>https://www.7layers.com/en/author/janett/</author_url><title>Cyber Security Assessment - 7layers</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="NA0SKWhQDV"&gt;&lt;a href="https://www.7layers.com/en/test-services/cyber-security-assessment/"&gt;Cyber Security Assessment&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.7layers.com/en/test-services/cyber-security-assessment/embed/#?secret=NA0SKWhQDV" width="600" height="338" title="&#x201C;Cyber Security Assessment&#x201D; &#x2014; 7layers" data-secret="NA0SKWhQDV" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.7layers.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Cyber Security Assessment The Internet of Things exposes everybody and everything to the risk of cyberattacks. Protection against cyberthreats is especially relevant and important for connected devices. We regularly hear news coverage of successful attacks even with very simple means. A third party assessment is a means of verifying an appropriate level of protection and [&hellip;]</description><thumbnail_url>https://www.7layers.com/wp-content/uploads/2020/09/7layers-bureau-veritas-test-services-headline.jpg</thumbnail_url></oembed>
