{"version":"1.0","provider_name":"Microsoft Azure Blog","provider_url":"https:\/\/azure.microsoft.com\/en-us\/blog","author_name":"Victor Bahl","author_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/victor-bahl\/","title":"Security for next generation telecommunication networks | Microsoft Azure Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MEpsH1Lrfq\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/\">Security for next generation telecommunication networks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/embed\/#?secret=MEpsH1Lrfq\" width=\"600\" height=\"338\" title=\"&#8220;Security for next generation telecommunication networks&#8221; &#8212; Microsoft Azure Blog\" data-secret=\"MEpsH1Lrfq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"It's clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our\u00a0networks and systems with security as our first principle and we stay constantly vigilant.\u00a0To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.","thumbnail_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp"}