<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Blanco Blog</provider_name><provider_url>https://blancoinfotech.com/blog</provider_url><author_name>admin</author_name><author_url>https://blancoinfotech.com/blog/author/admin/</author_url><title>Zero Trust Serverless Architecture - Blanco Blog</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="EUYWLtYXtg"&gt;&lt;a href="https://blancoinfotech.com/blog/zero-trust-serverless-architecture/"&gt;Zero Trust Serverless Architecture&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://blancoinfotech.com/blog/zero-trust-serverless-architecture/embed/#?secret=EUYWLtYXtg" width="600" height="338" title="&#x201C;Zero Trust Serverless Architecture&#x201D; &#x2014; Blanco Blog" data-secret="EUYWLtYXtg" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://blancoinfotech.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://blancoinfotech.com/blog/wp-content/uploads/2024/09/serverlessArch.jpg</thumbnail_url><thumbnail_width>750</thumbnail_width><thumbnail_height>429</thumbnail_height><description>The digital world is rapidly changing from what is normal with the use of cloud computing that has hit beyond the traditional virtual machines and containers into newer trends called serverless architectures. While organizations continue to deploy serverless models as the means to tap into its flexibility, scalability, and cheaper ways, a tremendous challenge arises-security. [&hellip;]</description></oembed>
