<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Trust &amp; Resilience for Maritime</provider_name><provider_url>https://cytur.net/en/</provider_url><author_name>cytur</author_name><author_url>https://cytur.net/en/author/cytur/</author_url><title>CYTUR-TM - Cyber Trust &amp; Resilience for Maritime</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="opeTntpuxZ"&gt;&lt;a href="https://cytur.net/en/cytur-tm/"&gt;CYTUR-TM&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://cytur.net/en/cytur-tm/embed/#?secret=opeTntpuxZ" width="600" height="338" title="&#x201C;CYTUR-TM&#x201D; &#x2014; Cyber Trust &amp; Resilience for Maritime" data-secret="opeTntpuxZ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://cytur.net/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>DESIGN PHASE CYTUR-TM&#x2122; Threat ModelerMaritime Cyber Threat Analysis Solution An intelligent threat modeling solution that generates virtual network maps from vessel design data, simulates potential attack paths in advance, and helps establish optimal defense strategies. Why You Need It Why Cybersecurity Must Start at the Design Phase &#x1F527; Eliminate Security Flaws at the Design Stage [&hellip;]</description><thumbnail_url>https://cytur.net/wp-content/uploads/2026/04/TM1.png</thumbnail_url></oembed>
