{"version":"1.0","provider_name":"CYTUR Maritime Cybersecurity Leader","provider_url":"https:\/\/cytur.net\/en\/","author_name":"cytur","author_url":"https:\/\/cytur.net\/en\/author\/cytur\/","title":"Technology - CYTUR Maritime Cybersecurity Leader","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"CS5GUPdTNC\"><a href=\"https:\/\/cytur.net\/en\/technology-overview\/\">Technology<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cytur.net\/en\/technology-overview\/embed\/#?secret=CS5GUPdTNC\" width=\"600\" height=\"338\" title=\"&#8220;Technology&#8221; &#8212; CYTUR Maritime Cybersecurity Leader\" data-secret=\"CS5GUPdTNC\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cytur.net\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Technology CYTUR&#8217;s Technology Differentiation Technology engineered for the unique challenges of maritime environments \u2014 beyond conventional IT security. AI, digital twin, maritime protocol analysis, and threat intelligence deliver protection that generic tools cannot. 01 AI-BASED ANOMALY DETECTION AI-Based Anomaly Detection Conventional IT security equipment cannot interpret vessel-specific protocols (NMEA, Modbus, AIS). Maritime-unique attacks like GPS [&hellip;]"}