{"version":"1.0","provider_name":"Software Engineering Daily","provider_url":"https:\/\/softwareengineeringdaily.com","author_name":"Zainab Ghori","author_url":"https:\/\/softwareengineeringdaily.com\/author\/zainab\/","title":"Episode Summary for Bridgecrew: Cloud Security with Barak Schoster - Software Engineering Daily","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"AqsAiY51yO\"><a href=\"https:\/\/softwareengineeringdaily.com\/2021\/05\/25\/episode-summary-bridgecrew-cloud-security-with-barak-schoster\/\">Episode Summary for Bridgecrew: Cloud Security with Barak Schoster<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/softwareengineeringdaily.com\/2021\/05\/25\/episode-summary-bridgecrew-cloud-security-with-barak-schoster\/embed\/#?secret=AqsAiY51yO\" width=\"600\" height=\"338\" title=\"&#8220;Episode Summary for Bridgecrew: Cloud Security with Barak Schoster&#8221; &#8212; Software Engineering Daily\" data-secret=\"AqsAiY51yO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/05\/BridgecrewView.png?fit=1536%2C1086&ssl=1","thumbnail_width":1536,"thumbnail_height":1086,"description":"Introduction to Bridgecrew As cloud technology begins to grow, maintaining security of vulnerable data can become a pressing issue for many companies. The CTO of Bridgecrew, Barak Schoster, explains the vision behind the company as it aims to monitor infrastructure and security errors from being deployed into production. Bridgecrew focuses on \u2018bridging the gap between"}