{"version":"1.0","provider_name":"Cataligent","provider_url":"https:\/\/cataligent.in\/blog","author_name":"cat_admin_usr","author_url":"https:\/\/cataligent.in\/blog\/author\/cat_admin_usr\/","title":"COBIT (Control Objectives for Information and Related Technologies) - Cataligent","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"khJd5MFboR\"><a href=\"https:\/\/cataligent.in\/blog\/it-service-management-itsm\/what-is-cobit\/\">COBIT (Control Objectives for Information and Related Technologies)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cataligent.in\/blog\/it-service-management-itsm\/what-is-cobit\/embed\/#?secret=khJd5MFboR\" width=\"600\" height=\"338\" title=\"&#8220;COBIT (Control Objectives for Information and Related Technologies)&#8221; &#8212; Cataligent\" data-secret=\"khJd5MFboR\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cataligent.in\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/cataligent.in\/blog\/wp-content\/uploads\/2025\/02\/19-COBIT-1024x576.png","thumbnail_width":1024,"thumbnail_height":576,"description":"In today\u2019s digital age, organizations rely heavily on information technology (IT) to drive business operations, innovation, and growth. However, with the increasing complexity of IT systems and the growing importance of data security, organizations need a robust framework to govern and manage their IT resources effectively. This is where COBIT (Control Objectives for Information and [&hellip;]"}