<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Inter-Con Security</provider_name><provider_url>https://icsecurity.com</provider_url><title>Protecting Against Insider Threats - Inter-Con Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="c19GhSCo06"&gt;&lt;a href="https://icsecurity.com/protecting-against-insider-threats/"&gt;Protecting Against Insider Threats&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://icsecurity.com/protecting-against-insider-threats/embed/#?secret=c19GhSCo06" width="600" height="338" title="&#x201C;Protecting Against Insider Threats&#x201D; &#x2014; Inter-Con Security" data-secret="c19GhSCo06" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://icsecurity.com/wp-content/uploads/2025/04/AdobeStock_514613885.webp</thumbnail_url><thumbnail_width>2560</thumbnail_width><thumbnail_height>1440</thumbnail_height><description>Insider threats remain one of the most challenging security risks for organizations. These threats, whether from disgruntled employees or malicious insiders, can result in data breaches, intellectual property theft, and even physical sabotage. The complexity of insider threats lies in the fact that these individuals already have access to sensitive information and systems, making it [&hellip;]</description></oembed>
