
<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Digital Content Next</provider_name><provider_url>https://digitalcontentnext.org</provider_url><title>Policing third-party code is essential to digital vendor risk management</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content"&gt;&lt;a href="https://digitalcontentnext.org/blog/2018/08/17/policing-third-party-code-is-essential-to-digital-vendor-risk-management/"&gt;Policing third-party code is essential to digital vendor risk management&lt;/a&gt;&lt;/blockquote&gt;
&lt;script type='text/javascript'&gt;
&lt;!--//--&gt;&lt;![CDATA[//&gt;&lt;!--
		/*! This file is auto-generated */
		!function(c,d){"use strict";var e=!1,n=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},!c.wp.receiveEmbedMessage)if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!/[^a-zA-Z0-9]/.test(t.secret)){for(var r,a,i,s=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=0;o&lt;n.length;o++)n[o].style.display="none";for(o=0;o&lt;s.length;o++)if(r=s[o],e.source===r.contentWindow){if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(i=parseInt(t.value,10)))i=1e3;else if(~~i&lt;200)i=200;r.height=i}if("link"===t.message)if(a=d.createElement("a"),i=d.createElement("a"),a.href=r.getAttribute("src"),i.href=t.value,i.host===a.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(!n){n=!0;for(var e,t,r=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),s=0;s&lt;i.length;s++){if(!(e=i[s]).getAttribute("data-secret"))t=Math.random().toString(36).substr(2,10),e.src+="#?secret="+t,e.setAttribute("data-secret",t);if(r||a)(t=e.cloneNode(!0)).removeAttribute("security"),e.parentNode.replaceChild(t,e)}}}}(window,document);
//--&gt;&lt;!]]&gt;
&lt;/script&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://digitalcontentnext.org/blog/2018/08/17/policing-third-party-code-is-essential-to-digital-vendor-risk-management/embed/" width="600" height="338" title="&#x201C;Policing third-party code is essential to digital vendor risk management&#x201D; &#x2014; Digital Content Next" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;</html><thumbnail_url>https://digitalcontentnext.org/wp-content/uploads/2018/08/BadCode.jpg</thumbnail_url><thumbnail_width>867</thumbnail_width><thumbnail_height>400</thumbnail_height><description>Some of the biggest companies including Saks Fifth Avenue, Best Buy, MyFitness Pal, and Applebees have been the victims of breaches due to third party code. When third parties become part of a website&#x2019;s support structure, they can increase risk because they lie outside of a formal IT organization&#x2019;s control.</description></oembed>
