{"version":"1.0","provider_name":"IT Knowledge Zone","provider_url":"https:\/\/itknowledgezone.com\/kr","author_name":"IT Knowledge Zone","author_url":"https:\/\/itknowledgezone.com\/kr\/author\/it-knowledge-zone\/","title":"Future-Proofing Cybersecurity: Key Trends Shaping 2026 & Beyond","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"YGZe6XVYiP\"><a href=\"https:\/\/itknowledgezone.com\/kr\/event\/future-proofing-cybersecurity\/\">Future-Proofing Cybersecurity: Key Trends Shaping 2026 &amp; Beyond<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/itknowledgezone.com\/kr\/event\/future-proofing-cybersecurity\/embed\/#?secret=YGZe6XVYiP\" width=\"600\" height=\"338\" title=\"&#8220;Future-Proofing Cybersecurity: Key Trends Shaping 2026 &amp; Beyond&#8221; &#8212; IT Knowledge Zone\" data-secret=\"YGZe6XVYiP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/itknowledgezone.com\/kr\/wp-content\/uploads\/2025\/12\/beyond-trust-t-695e3b9f4ca50.webp","thumbnail_width":351,"thumbnail_height":200,"description":"Future-Proofing Cybersecurity: Key Trends Shaping 2026 & Beyond | \uc0ac\uc774\ubc84\ubcf4\uc548 \ud658\uacbd\uc740 \uc5d0\uc774\uc804\ud2f1 AI, \uc2e0\uc6d0 \uae30\ubc18 \uc704\ud611\uc5d0\uc11c\ubd80\ud130 \uc9c0\uc815\ud559\uc801 \uc774\uc288, \ub124\uc624\ud074\ub77c\uc6b0\ub4dc, \uadf8\ub9ac\uace0 \uc720\uc5f0\ud55c \uadfc\ubb34 \ud658\uacbd\uc5d0 \uc774\ub974\uae30\uae4c\uc9c0 \ube60\ub974\uac8c \ubcc0\ud654\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ubcf8 \uc6e8\ube44\ub098\uc5d0\uc11c\ub294 \uc0ac\uc774\ubc84\ubcf4\uc548 \uc804\ubb38\uac00 \ud328\ub110\uc774 2026\ub144\uc744 \ub300\ube44\ud55c \uc8fc\uc694 \uc608\uce21\uacfc \uc774\ub7ec\ud55c \ubcc0\ud654\uac00 \ubcf4\uc548 \uc804\ub7b5\uc5d0 \uc5b4\ub5a4 \uc758\ubbf8\ub97c \uac00\uc9c0\ub294\uc9c0 \uacf5\uc720\ud569\ub2c8\ub2e4."}