{"version":"1.0","provider_name":"CYTUR Maritime Cybersecurity Leader","provider_url":"https:\/\/cytur.net\/en\/","author_name":"cytur","author_url":"https:\/\/cytur.net\/en\/author\/cytur\/","title":"Solutions Equipment Vendors - CYTUR Maritime Cybersecurity Leader","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"XC6NMhq1xc\"><a href=\"https:\/\/cytur.net\/en\/solutions-equipment-vendors\/\">Solutions Equipment Vendors<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cytur.net\/en\/solutions-equipment-vendors\/embed\/#?secret=XC6NMhq1xc\" width=\"600\" height=\"338\" title=\"&#8220;Solutions Equipment Vendors&#8221; &#8212; CYTUR Maritime Cybersecurity Leader\" data-secret=\"XC6NMhq1xc\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cytur.net\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Equipment Vendor FAT-Stage Security Verification.Supply Chain Trust. Automate IACS UR E27 Type Approval certification andgain global competitiveness with security-verified equipment. Challenges Challenges Facing Equipment Vendors Mandatory cybersecurity compliance verification in the Type Approval process Security must be embedded across the entire lifecycle from design to maintenance (SDLC) Obligation to submit extensive security evidence documentation required [&hellip;]","thumbnail_url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/solution_equpment-vendors-scaled.png"}