<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>OSTEC | Seguran&#xE7;a digital de resultados</provider_name><provider_url>https://ostec.blog/en/</provider_url><author_name>Labbo</author_name><author_url>https://ostec.blog/en/author/labbo/</author_url><title>ROI Calculation on Security Projects - OSTEC | Seguran&#xE7;a digital de resultados</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="FsjrZvsiX0"&gt;&lt;a href="https://ostec.blog/en/general/roi-calculation-on-security-projects/"&gt;ROI Calculation on Security Projects&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://ostec.blog/en/general/roi-calculation-on-security-projects/embed/#?secret=FsjrZvsiX0" width="600" height="338" title="&#x201C;ROI Calculation on Security Projects&#x201D; &#x2014; OSTEC | Seguran&#xE7;a digital de resultados" data-secret="FsjrZvsiX0" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://ostec.blog/wp-content/uploads/2016/08/calculando-1.jpg</thumbnail_url><thumbnail_width>928</thumbnail_width><thumbnail_height>534</thumbnail_height><description>There are information security projects of the most varied sizes and budgets, and the greater the maturity of companies in the theme, the greater their control over the variables that ensure the viability of a project. The budget is important, but not necessarily restrictive. However, if we analyze a market of small and medium-sized companies, [&hellip;]</description></oembed>
