{"version":"1.0","provider_name":"MozDomains Blog","provider_url":"https:\/\/www.mozdomains.co.mz\/blog\/en","author_name":"Momed Jussub","author_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/","title":"Achieving The Web Applications Security - MozDomains Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"BYTr6mSEVV\"><a href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/\">Achieving The Web Applications Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/embed\/#?secret=BYTr6mSEVV\" width=\"600\" height=\"338\" title=\"&#8220;Achieving The Web Applications Security&#8221; &#8212; MozDomains Blog\" data-secret=\"BYTr6mSEVV\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Fotolia_59066357_M.jpg","thumbnail_width":1628,"thumbnail_height":1167,"description":"Web applications play a critical role in half of all breaches that happen around the world. With all this going around for a while now, a meager of 10% of companies secure all their critical applications and have the applications reviewed on security stance before and during production. Of late, the need arises for the companies to be clear on their\u00a0web application security\u00a0agenda. There is a dire need to replace fragmented, manual pen testing with ongoing, automated scanning. By doing so, they can defend their global application infrastructures. And this would also do away with the need for hiring extra\u2026"}