{"version":"1.0","provider_name":"Cyber Trust &amp; Resilience for Maritime","provider_url":"https:\/\/cytur.net\/en\/","author_name":"cytur","author_url":"https:\/\/cytur.net\/en\/author\/cytur\/","title":"Technology - Cyber Trust &amp; Resilience for Maritime","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"391YbORClT\"><a href=\"https:\/\/cytur.net\/en\/technology\/\">Technology<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cytur.net\/en\/technology\/embed\/#?secret=391YbORClT\" width=\"600\" height=\"338\" title=\"&#8220;Technology&#8221; &#8212; Cyber Trust &amp; Resilience for Maritime\" data-secret=\"391YbORClT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cytur.net\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Technology What Sets CYTUR Apart Technology engineered for the unique challenges of the maritime environment \u2014 beyond conventional IT security. AI, digital twins, maritime protocol analysis, and threat intelligence deliver protection that generic tools simply cannot. 01 AI-BASED ANOMALY DETECTION AI-Based Anomaly Detection Standard IT security appliances do not understand maritime-specific protocols such as NMEA, [&hellip;]"}