    <meta property="twitter:title" content="How Does DevSecOps Fit Into Your Digital Transformation?" />
    <meta property="twitter:description" content="Going digital and embarking on a digital transformation is hard enough without having to rethink your entire security strategy. By weaving security into the fabric of your company's digital identity, you can catch problems earlier, faster, and with far less overhead than if you took a more traditional, outside-in approach to security. Going digital and embarking on a digital transformation is hard enough without having to rethink your entire security strategy. By weaving security into the fabric of your company's digital identity, you can catch problems earlier, faster, and with far less overhead than if you took a more traditional, outside-in approach to security." />
<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Palo Alto Networks Blog</provider_name><provider_url>https://origin-researchcenter.paloaltonetworks.com/blog</provider_url><author_name>Blaithin Underhill</author_name><author_url>https://origin-researchcenter.paloaltonetworks.com/blog/author/blaithin-underhill/</author_url><title>How Does DevSecOps Fit Into Your Digital Transformation?</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="nVChB8QrNh"&gt;&lt;a href="https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/digital-transformation/"&gt;How Does DevSecOps Fit Into Your Digital Transformation?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/digital-transformation/embed/#?secret=nVChB8QrNh" width="600" height="338" title="&#x201C;How Does DevSecOps Fit Into Your Digital Transformation?&#x201D; &#x2014; Palo Alto Networks Blog" data-secret="nVChB8QrNh" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://origin-researchcenter.paloaltonetworks.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/11/Picture-5.png</thumbnail_url><thumbnail_width>860</thumbnail_width><thumbnail_height>585</thumbnail_height><description>Going digital and embarking on a digital transformation is hard enough without having to rethink your entire security strategy. By weaving security into the fabric of your company's digital identity, you can catch problems earlier, faster, and with far less overhead than if you took a more traditional, outside-in approach to security. Going digital and embarking on a digital transformation is hard enough without having to rethink your entire security strategy. By weaving security into the fabric of your company's digital identity, you can catch problems earlier, faster, and with far less overhead than if you took a more traditional, outside-in approach to security.</description></oembed>
