{"version":"1.0","provider_name":"Wroffy Technologies Pvt. Ltd. &#174;","provider_url":"https:\/\/www.wroffy.com\/blog","author_name":"Ishika Rao","author_url":"https:\/\/www.wroffy.com\/blog\/author\/admin\/","title":"Introducing Sophos MDR for Microsoft Defender","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Hr0wDo580E\"><a href=\"https:\/\/www.wroffy.com\/blog\/introducing-sophos-mdr-for-microsoft-defender\/\">Introducing Sophos MDR for Microsoft Defender<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.wroffy.com\/blog\/introducing-sophos-mdr-for-microsoft-defender\/embed\/#?secret=Hr0wDo580E\" width=\"600\" height=\"338\" title=\"&#8220;Introducing Sophos MDR for Microsoft Defender&#8221; &#8212; Wroffy Technologies Pvt. Ltd. &#174;\" data-secret=\"Hr0wDo580E\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.wroffy.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.wroffy.com\/blog\/wp-content\/uploads\/2023\/07\/sophos1.jpg","thumbnail_width":600,"thumbnail_height":400,"description":"In the 21st century, everything has been launched so far, and we are provided with all the solutions on how to use and protect our software from cyberthreats. But still, many organizations that own small businesses or start-ups still think about how they can secure their software in a proper manner. According to recent research, [&hellip;]"}