<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>Responsibility Doesn&#x2019;t End With Disclosure - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="tgIm6Xz5cA"&gt;&lt;a href="https://www.cyberthreatalliance.org/responsibility-doesnt-end-with-disclosure/"&gt;Responsibility Doesn&#x2019;t End With Disclosure&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/responsibility-doesnt-end-with-disclosure/embed/#?secret=tgIm6Xz5cA" width="600" height="338" title="&#x201C;Responsibility Doesn&#x2019;t End With Disclosure&#x201D; &#x2014; Cyber Threat Alliance" data-secret="tgIm6Xz5cA" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2024/05/CTA_blog_Disclosure-01-01.png</thumbnail_url><thumbnail_width>3229</thumbnail_width><thumbnail_height>2195</thumbnail_height><description>By Michael Daniel, CTA President &amp; CEO For years, the cybersecurity community argued about how researchers should disclose newly discovered vulnerabilities in information technology products, as well as how companies should handle being told about vulnerabilities in their products.&nbsp; After considerable debate and not a little rancor, the industry settled on a set of principles &hellip; Continued</description></oembed>
