
{"id":3860,"date":"2017-05-26T08:40:21","date_gmt":"2017-05-26T11:40:21","guid":{"rendered":"https:\/\/www.talsoft.com.ar\/site\/?p=3860"},"modified":"2017-05-26T08:42:31","modified_gmt":"2017-05-26T11:42:31","slug":"entrevista-ciberataques-las-empresas","status":"publish","type":"post","link":"https:\/\/www.talsoft.com.ar\/site\/es\/entrevista-ciberataques-las-empresas\/","title":{"rendered":"Entrevista sobre ciberataques a las empresas"},"content":{"rendered":"<p>El 19 de Mayo del 2017 nos invitaron a una nota en el programa de \u00abPol\u00edtica y Producci\u00f3n\u00bb de la <a href=\"http:\/\/www.ucip.org.ar\/programa-tv\/\">UCIP<\/a>. Para conversar sobre los ataques cibern\u00e9ticos a las empresas y algunas recomendaciones para el negocio.<\/p>\n<p>La nota empieza en el minuto 3:38<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El 19 de Mayo del 2017 nos invitaron a una nota en el programa de \u00abPol\u00edtica y Producci\u00f3n\u00bb de la UCIP. Para conversar sobre los ataques cibern\u00e9ticos a las empresas y algunas recomendaciones para el negocio. La nota empieza en el minuto 3:38<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"video","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3860","post","type-post","status-publish","format-video","hentry","category-profesional","post_format-post-format-video"],"_links":{"self":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/3860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/comments?post=3860"}],"version-history":[{"count":3,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/3860\/revisions"}],"predecessor-version":[{"id":3863,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/3860\/revisions\/3863"}],"wp:attachment":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/media?parent=3860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/categories?post=3860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/tags?post=3860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}