{"version":"1.0","provider_name":"\u062c\u062f\u0627\u064a\u0627","provider_url":"https:\/\/jadaya.com\/ar","author_name":"almodroid@gmail.com","author_url":"https:\/\/jadaya.com\/ar\/author\/almodroidgmail-com\/","title":"Cybersecurity, Cloud, and AI - jadaya","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ZFJwqdGSAj\"><a href=\"https:\/\/jadaya.com\/ar\/service\/cybersecurity-cloud-and-ai\/\">\u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a, \u0627\u0644\u0633\u062d\u0627\u0628\u0629, \u0648\u0627\u0644\u0630\u0643\u0627\u0621 \u0627\u0644\u0627\u0635\u0637\u0646\u0627\u0639\u064a<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/jadaya.com\/ar\/service\/cybersecurity-cloud-and-ai\/embed\/#?secret=ZFJwqdGSAj\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity, Cloud, and AI&#8221; &#8212; jadaya\" data-secret=\"ZFJwqdGSAj\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/jadaya.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/jadaya.com\/wp-content\/uploads\/2025\/02\/Image_fx-20.png","thumbnail_width":1408,"thumbnail_height":768,"description":"Cybersecurity, Cloud, and AI Solutions jadaya &gt; Blog We empower organizations to secure their operations, scale their systems, and leverage artificial intelligence to improve risk and compliance management. Key Capabilities Cybersecurity Risk and Compliance Advisory (ISO, NCA, SAMA, etc.) Cloud-Based GRC Deployment and Management (Public, Private, Hybrid) AI-Powered Regulatory Monitoring and Risk Scoring Data Privacy..."}