{"version":"1.0","provider_name":"","provider_url":"https:\/\/certpanel.com\/resources","author_name":"casey.crane","author_url":"https:\/\/certpanel.com\/resources\/author\/casey-crane\/","title":"Managing SSL Vulnerabilities: SSL Vulnerability Tools &amp; Best Practices","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"JbUfasP9Fe\"><a href=\"https:\/\/certpanel.com\/resources\/ssl-vulnerability-management-tools-and-best-practices\/\">Managing SSL Vulnerabilities: SSL Vulnerability Tools &amp; Best Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/certpanel.com\/resources\/ssl-vulnerability-management-tools-and-best-practices\/embed\/#?secret=JbUfasP9Fe\" width=\"600\" height=\"338\" title=\"&#8220;Managing SSL Vulnerabilities: SSL Vulnerability Tools &amp; Best Practices&#8221; &#8212; \" data-secret=\"JbUfasP9Fe\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/certpanel.com\/resources\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/certpanel.com\/resources\/wp-content\/uploads\/vulnerability-management-feature-big.jpg","thumbnail_width":1258,"thumbnail_height":602,"description":"In many ways, proper SSL vulnerability management is primarily about staying abreast of the latest technologies and best practices. By identifying weaknesses in those technologies (e.g., SSL and TLS protocols) and the ways they\u2019re managed, you can help mitigate the risks that cybercriminals love to exploit. As such, SSL vulnerabilities are crucial to monitor because"}