<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>Check Point Software Technologies Celebrates the Cyber Threat Alliance&#x2019;s 5th Birthday - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="STgcQ8lBgg"&gt;&lt;a href="https://www.cyberthreatalliance.org/check-point-software-technologies-celebrates-the-cyber-threat-alliances-5th-birthday/"&gt;Check Point Software Technologies Celebrates the Cyber Threat Alliance&#x2019;s 5th Birthday&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/check-point-software-technologies-celebrates-the-cyber-threat-alliances-5th-birthday/embed/#?secret=STgcQ8lBgg" width="600" height="338" title="&#x201C;Check Point Software Technologies Celebrates the Cyber Threat Alliance&#x2019;s 5th Birthday&#x201D; &#x2014; Cyber Threat Alliance" data-secret="STgcQ8lBgg" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2022/01/guest_blog_5-years_CP-01-2.png</thumbnail_url><thumbnail_width>647</thumbnail_width><thumbnail_height>346</thumbnail_height><description>Written by Jason Min, Head of Business Development, Check Point Software Technologies As Check Point celebrates the 5th birthday of the Cyber Threat Alliance, we are honored to continue our partnership with them. Check Point became a Charter Member because we strongly believe in the CTA&#x2019;s mission to improve the overall security of the global &hellip; Continued</description></oembed>
