<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>CoreSight</provider_name><provider_url>https://coresight.com.au</provider_url><author_name>CScontent</author_name><author_url>https://coresight.com.au/author/cscontent/</author_url><title>Australian Signals Directorate (ASD) - The Essential Eight Explained | CoreSight</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content"&gt;&lt;a href="https://coresight.com.au/asd-essential-eight-explained/"&gt;&lt;thrive_headline click tho-post-975 tho-test-3&gt;Australian Signals Directorate (ASD) &#x2013; The Essential Eight Explained&lt;/thrive_headline&gt;&lt;/a&gt;&lt;/blockquote&gt;
&lt;script type='text/javascript'&gt;
&lt;!--//--&gt;&lt;![CDATA[//&gt;&lt;!--
		/*! This file is auto-generated */
		!function(c,d){"use strict";var e=!1,n=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},!c.wp.receiveEmbedMessage)if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!/[^a-zA-Z0-9]/.test(t.secret)){for(var r,a,i,s=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=0;o&lt;n.length;o++)n[o].style.display="none";for(o=0;o&lt;s.length;o++)if(r=s[o],e.source===r.contentWindow){if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(i=parseInt(t.value,10)))i=1e3;else if(~~i&lt;200)i=200;r.height=i}if("link"===t.message)if(a=d.createElement("a"),i=d.createElement("a"),a.href=r.getAttribute("src"),i.href=t.value,i.host===a.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(!n){n=!0;for(var e,t,r=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),s=0;s&lt;i.length;s++){if(!(e=i[s]).getAttribute("data-secret"))t=Math.random().toString(36).substr(2,10),e.src+="#?secret="+t,e.setAttribute("data-secret",t);if(r||a)(t=e.cloneNode(!0)).removeAttribute("security"),e.parentNode.replaceChild(t,e)}}}}(window,document);
//--&gt;&lt;!]]&gt;
&lt;/script&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://coresight.com.au/asd-essential-eight-explained/embed/" width="600" height="338" title="&#x201C;&lt;thrive_headline click tho-post-975 tho-test-3&gt;Australian Signals Directorate (ASD) &#x2013; The Essential Eight Explained&lt;/thrive_headline&gt;&#x201D; &#x2014; CoreSight" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;</html><thumbnail_url>https://coresight.com.au/wp-content/uploads/2017/03/sydney-essential-eight.jpg</thumbnail_url><thumbnail_width>1</thumbnail_width><thumbnail_height>1</thumbnail_height><description>(By Morey Haber &#x2013; Feb 8th, 2017)&#xA0; The dynamic nature of cyber security requires constant adjustments and course corrections to address the latest threats. Businesses and governments are accustomed to broad stroke changes occurring every few years, but rarely are recommendations made that are very precise to manage specific threats. In October 2014, BeyondTrust responded [&hellip;]</description></oembed>
