{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"Episode 57: Top Ten Cybersecurity Misconfigurations: Unrestricted Code Execution","description":"Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways:&amp;nbsp;Unrestricted Code Execution. &amp;nbsp; Connect with us:&amp;nbsp; https:\/\/www.linkedin.com\/company\/envisionitllc&amp;nbsp; marketing@envisionitllc.com&amp;nbsp; ","author_name":"Geek Speak - Tech Talks with Envision IT","author_url":"https:\/\/www.envisionitllc.com","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/31433057\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/efbe1c\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/content\/172372402"}