{"version":"1.0","provider_name":"Cyber Trust &amp; Resilience for Maritime","provider_url":"https:\/\/cytur.net\/en\/","author_name":"cytur","author_url":"https:\/\/cytur.net\/en\/author\/cytur\/","title":"CYTUR-SC - Cyber Trust &amp; Resilience for Maritime","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TpgLrvJ9Dk\"><a href=\"https:\/\/cytur.net\/en\/cytur-sc\/\">CYTUR-SC<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cytur.net\/en\/cytur-sc\/embed\/#?secret=TpgLrvJ9Dk\" width=\"600\" height=\"338\" title=\"&#8220;CYTUR-SC&#8221; &#8212; Cyber Trust &amp; Resilience for Maritime\" data-secret=\"TpgLrvJ9Dk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cytur.net\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"VERIFY CYTUR-SC\u2122 ScannerVessel, Asset &#038; Network Portable Scanner A portable security integrity verification solution that automatically discovers all assets connected to complex vessel networks and performs deep analysis for hidden vulnerabilities. It identifies and classifies even undetectable shadow devices, objectively verifying the vessel&#8217;s security posture. Why You Need It Why a Portable Security Scanner Is [&hellip;]","thumbnail_url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/SC-1.png"}