<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Infoblox Blog</provider_name><provider_url>https://www.infoblox.com/blog</provider_url><author_name>Kevin Zettel</author_name><author_url>https://www.infoblox.com/blog/author/kevin-zettel/</author_url><title>Protecting Organizations from Themselves</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="l1Efvkw7cn"&gt;&lt;a href="https://www.infoblox.com/blog/cloud-native/protecting-organizations-from-themselves/"&gt;Protecting Organizations from Themselves&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.infoblox.com/blog/cloud-native/protecting-organizations-from-themselves/embed/#?secret=l1Efvkw7cn" width="600" height="338" title="&#x201C;Protecting Organizations from Themselves&#x201D; &#x2014; Infoblox Blog" data-secret="l1Efvkw7cn" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.infoblox.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.infoblox.com/blog/wp-content/uploads/IT-updates-3.jpg</thumbnail_url><thumbnail_width>1189</thumbnail_width><thumbnail_height>619</thumbnail_height><description>Protecting Organizations from Themselves. Access Control. There are three types of controls, Physical controls (a locked door or fence), administrative controls (company policies and guidelines), and finally technical controls. That last security control with technical controls is what you can use today to help protect your Infoblox BloxOne Cloud resources.</description></oembed>
