{"version":"1.0","provider_name":"SaaSworthy Blog | Top Software, Statistics, Insights, Reviews &amp; Trends in SaaS","provider_url":"https:\/\/dev.saasworthy.com\/blog","author_name":"Rajnish Shankhar","author_url":"https:\/\/dev.saasworthy.com\/blog\/author\/rajnish","title":"A Guide to Vulnerability Management Software - SaaSworthy Blog | Top Software, Statistics, Insights, Reviews &amp; Trends in SaaS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"e5C9BR3s93\"><a href=\"https:\/\/dev.saasworthy.com\/blog\/a-guide-to-vulnerability-management-software\">A Guide to Vulnerability Management Software<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dev.saasworthy.com\/blog\/a-guide-to-vulnerability-management-software\/embed#?secret=e5C9BR3s93\" width=\"600\" height=\"338\" title=\"&#8220;A Guide to Vulnerability Management Software&#8221; &#8212; SaaSworthy Blog | Top Software, Statistics, Insights, Reviews &amp; Trends in SaaS\" data-secret=\"e5C9BR3s93\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/dev.saasworthy.com\/blog\/wp-content\/uploads\/2022\/06\/VULNERABILITY.jpg","thumbnail_width":770,"thumbnail_height":515,"description":"If your firm doesn't have vulnerability management software in place, it's critical to understand the risks and what you can do to create one as part of your overall cybersecurity plan. Click to know more.\u00a0"}