{"id":969,"date":"2023-01-04T21:26:56","date_gmt":"2023-01-04T21:26:56","guid":{"rendered":"https:\/\/itsungroup.com\/?page_id=969"},"modified":"2023-01-18T01:02:42","modified_gmt":"2023-01-18T01:02:42","slug":"seguridad-en-todo","status":"publish","type":"page","link":"https:\/\/itsungroup.com\/","title":{"rendered":"Noticia de la semana                                 Seguridad para todo!"},"content":{"rendered":"\n<p>De un vistazo a lo que informan principales fabricantes!<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/common-cyberattacks.html\">https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/common-cyberattacks.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/cyberattacks\/most-common-cyberattacks\/\">https:\/\/www.crowdstrike.com\/cybersecurity-101\/cyberattacks\/most-common-cyberattacks\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/types-of-cyber-attacks\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/types-of-cyber-attacks<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.rapid7.com\/fundamentals\/types-of-attacks\/\">https:\/\/www.rapid7.com\/fundamentals\/types-of-attacks\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.kaspersky.com\/resource-center\/preemptive-safety\/cyber-security-trends\">https:\/\/www.kaspersky.com\/resource-center\/preemptive-safety\/cyber-security-trends<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/threat\">https:\/\/www.paloaltonetworks.com\/cyberpedia\/threat<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/aws.amazon.com\/es\/what-is\/cybersecurity\/\">https:\/\/aws.amazon.com\/es\/what-is\/cybersecurity\/<\/a><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>De un vistazo a lo que informan principales fabricantes! https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/common-cyberattacks.html https:\/\/www.crowdstrike.com\/cybersecurity-101\/cyberattacks\/most-common-cyberattacks\/ https:\/\/www.fortinet.com\/resources\/cyberglossary\/types-of-cyber-attacks https:\/\/www.rapid7.com\/fundamentals\/types-of-attacks\/ https:\/\/www.kaspersky.com\/resource-center\/preemptive-safety\/cyber-security-trends https:\/\/www.paloaltonetworks.com\/cyberpedia\/threat https:\/\/aws.amazon.com\/es\/what-is\/cybersecurity\/<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/itsungroup.com\/index.php?rest_route=\/wp\/v2\/pages\/969"}],"collection":[{"href":"https:\/\/itsungroup.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itsungroup.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itsungroup.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itsungroup.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=969"}],"version-history":[{"count":15,"href":"https:\/\/itsungroup.com\/index.php?rest_route=\/wp\/v2\/pages\/969\/revisions"}],"predecessor-version":[{"id":1073,"href":"https:\/\/itsungroup.com\/index.php?rest_route=\/wp\/v2\/pages\/969\/revisions\/1073"}],"wp:attachment":[{"href":"https:\/\/itsungroup.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}