{"version":"1.0","provider_name":"NB Blog","provider_url":"https:\/\/www.networkbulls.com\/blog","author_name":"Network Bulls","author_url":"https:\/\/www.networkbulls.com\/blog\/author\/networkbulls\/","title":"Why Network Security and not Information Security?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"dTcYkPlnja\"><a href=\"https:\/\/www.networkbulls.com\/blog\/why-network-security-and-not-information-security\/\">Why Network Security and not Information Security?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.networkbulls.com\/blog\/why-network-security-and-not-information-security\/embed\/#?secret=dTcYkPlnja\" width=\"600\" height=\"338\" title=\"&#8220;Why Network Security and not Information Security?&#8221; &#8212; NB Blog\" data-secret=\"dTcYkPlnja\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.networkbulls.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.networkbulls.com\/blog\/wp-content\/uploads\/2025\/11\/Why-Network-Security-and-not-Information-Security.jpg","thumbnail_width":800,"thumbnail_height":500,"description":"Security plays an important role in all fields of IT industry. Be it networking, information, database, cyber threats, etc. each and every aspect of our industry requires secure access to its information\/data with protection against all the possible vulnerabilities posing threat to its integrity and authenticity. Network security is related to an act of protecting [&hellip;]"}