<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>EcommerceBytes</provider_name><provider_url>https://www.ecommercebytes.com</provider_url><author_name>Ina Steiner</author_name><author_url>https://www.ecommercebytes.com/author/ina-steiner/</author_url><title>eBay, Behind the Breach Part 2: Storing Sensitive Data - EcommerceBytes</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="dP09qZV4hn"&gt;&lt;a href="https://www.ecommercebytes.com/2014/05/26/ebay-behind-breach-part-2-storing-sensitive-data/"&gt;eBay, Behind the Breach Part 2: Storing Sensitive Data&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.ecommercebytes.com/2014/05/26/ebay-behind-breach-part-2-storing-sensitive-data/embed/#?secret=dP09qZV4hn" width="600" height="338" title="&#x201C;eBay, Behind the Breach Part 2: Storing Sensitive Data&#x201D; &#x2014; EcommerceBytes" data-secret="dP09qZV4hn" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>EcommerceBytes called on Zulfikar Ramzan, Chief Technology Officer of&#xA0;Elastica, to provide some context around eBay&#x2019;s security breach. In Part 1, he talked about what&#x2019;s going on at eBay right now based on his experience working with other companies that have gone through the exact situation now facing eBay. In part 2, he answers questions about [&hellip;]</description></oembed>
