
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Encryption at the Hardware and Storage Level","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zWxVOyJI6e\"><a href=\"https:\/\/www.otava.com\/blog\/encryption-at-the-hardware-and-storage-level\/\">Encryption at the Hardware and Storage Level<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/encryption-at-the-hardware-and-storage-level\/embed\/#?secret=zWxVOyJI6e\" width=\"600\" height=\"338\" title=\"&#8220;Encryption at the Hardware and Storage Level&#8221; &#8212; OTAVA\" data-secret=\"zWxVOyJI6e\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption. For the first one of the series, join Chris Heuman, Practice Leader for RISC Management and Consulting for a discussion on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. Find out how you can sign up online for Encryption \u2013 Perspective on Privacy, Security &amp; Compliance. The second in the encryption webinar series features Mark Stanislav, Security Evangelist at Duo Security as he discusses encryption for Linux, and Farooq Ahmed, Software Development Manager of Online Tech who will cover encryption for Windows. Sign up for Encryption at the Software Level: Linux and Windows. For the third and final encryption webinar, join Steve Aiello, Systems Support Manager at Online Tech for a presentation on encryption at the hardware and storage level. Title: Encryption at the Hardware and Storage Level When: Tuesday, June 25, 2013 @2PM ET Register: Find the GoToMeeting link at our website. Description: Join Steve Aiello, Systems Support Manager at Online Tech for an informative webinar on encryption..."}