{"version":"1.0","provider_name":"Security Boulevard","provider_url":"https:\/\/securityboulevard.com","title":"Key takeaways from the latest DoD Enterprise DevSecOps Fundamentals update","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"gnBaVal0Gq\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/\">Key takeaways from the latest DoD Enterprise DevSecOps Fundamentals update<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/embed\/#?secret=gnBaVal0Gq\" width=\"600\" height=\"338\" title=\"&#8220;Key takeaways from the latest DoD Enterprise DevSecOps Fundamentals update&#8221; &#8212; Security Boulevard\" data-secret=\"gnBaVal0Gq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"As the cybersecurity landscape changes and threats evolve, the Department of Defense (DoD) has updated its Enterprise DevSecOps Fundamentals to align development practices with security imperatives further. This is part of a long-term effort by the DoD to improve how software is developed, deployed, and managed across its network, including its business systems, weapons systems, embedded software, and essential command, control, and combat support systems.","thumbnail_url":"https:\/\/www.sonatype.com\/hubfs\/AI-Generated%20Media\/Images\/A%20clean%20and%20modern%20header%20image%20showing%20a%20secure%20software%20pipeline%20concept%20a%20digital%20representation%20of%20a%20factory%20producing%20software%20components%2C%20with%20i.jpeg"}