{"version":"1.0","provider_name":"Boyd Tech Solutions","provider_url":"https:\/\/boydtechsolutions.com\/wordpress","title":"What is Threat Exposure Management (TEM)? - Boyd Tech Solutions","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"WHTLi0JDWc\"><a href=\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2025\/01\/15\/what-is-threat-exposure-management-tem\/\">What is Threat Exposure Management (TEM)?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2025\/01\/15\/what-is-threat-exposure-management-tem\/embed\/#?secret=WHTLi0JDWc\" width=\"600\" height=\"338\" title=\"&#8220;What is Threat Exposure Management (TEM)?&#8221; &#8212; Boyd Tech Solutions\" data-secret=\"WHTLi0JDWc\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/boydtechsolutions.com\/wordpress\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2024\/12\/What-is-Threat-Exposure-Management-TEM_.png","thumbnail_width":1280,"thumbnail_height":867,"description":"Threat Exposure Management (TEM) is an important cybersecurity tool. It helps organizations find and fix weak spots in their digital systems. TEM outsmarts hackers before they break into your network. Importance of TEM Cyber attacks keep getting worse. Hackers always find new ways to break in. TEM helps businesses spot problems before they become big [&hellip;]"}