{"id":9025,"date":"2023-06-12T16:20:20","date_gmt":"2023-06-12T16:20:20","guid":{"rendered":"https:\/\/csiaradar.com\/?p=9025"},"modified":"2023-06-12T16:20:20","modified_gmt":"2023-06-12T16:20:20","slug":"los-cibercriminales-son-capaces-de-atacar-en-menos-de-tres-dias","status":"publish","type":"post","link":"https:\/\/csiaradar.com\/es\/los-cibercriminales-son-capaces-de-atacar-en-menos-de-tres-dias\/","title":{"rendered":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d"},"content":{"rendered":"<ul>\n<li aria-level=\"1\"><b>Isabel Trist\u00e1n, Directora de Ventas de Software de Seguridad de IBM afirma que \u201cla ciberseguridad tradicional ha quedado obsoleta\u201d y aboga por elevar la figura \u201cdel analista de ciberseguridad y facilitar su trabajo\u201d.<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Pedro \u00c1lamo, Senior Account Manager Public Sector de Proofpoint: \u201cEl 97% de las brechas de ataque hacia los usuarios son a trav\u00e9s del correo electr\u00f3nico\u201d.\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Ma\u00f1ana, 13 de junio en Fibes, el evento contar\u00e1 con la participaci\u00f3n de INCIBE, CCI, Telef\u00f3nica Tech, Polic\u00eda Nacional, Guardia Civil y la Agencia Digital de Andaluc\u00eda. <\/b><\/li>\n<\/ul>\n<p>La sesi\u00f3n de tarde de la jornada inaugural de \u2018<strong>CSI Radar<\/strong>\u2019 ha contado con la presencia de grandes <strong>multinacionales de Estados Unidos y China<\/strong>. Por parte de EE.UU. han participado <strong>IBM <\/strong>con <strong>Isabel Trist\u00e1n<\/strong>, Directora de Ventas Software de Seguridad; <strong>Proofpoint <\/strong>con <strong>Pedro \u00c1lamo<\/strong>, Senior Account Manager Public Sector; y <strong>AWS <\/strong>a trav\u00e9s de <strong>Jes\u00fas Rodr\u00edguez<\/strong>, CyberSecurity Sales Specialist-Iberia. China ha estado representada a trav\u00e9s de <strong>Huawei <\/strong>con <strong>Jos\u00e9 Capote<\/strong>, Cyber Security And Privacy Officer; y a trav\u00e9s de <strong>ZTE <\/strong>con <strong>Antonio Relvas<\/strong>, Director de Estrategia de Ciberseguridad.<\/p>\n<p>El plato fuerte de la tarde ha llegado con la presencia de <strong>Isabel Trist\u00e1n<\/strong>, Directora de Ventas Software de Seguridad de <strong>IBM<\/strong>, quien ha hablado sobre la forma en la que las<strong> empresas deben ser capaces de reaccionar<\/strong> con m\u00e1s tiempo de antelaci\u00f3n ante posibles <strong>ataques<\/strong>. \u201cLos cibercriminales han evolucionado y son capaces de desplegar <strong>ataques de ransomware en menos de tres d\u00edas<\/strong>, mientras que el tiempo medio de las empresas es de <strong>7 meses<\/strong> para detectar un incidente y de 2 meses para reaccionar ante uno de esos incidentes\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9026 size-large\" src=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-P06-12-at-17.37.01-1024x684.jpeg\" alt=\"\" width=\"1024\" height=\"684\" srcset=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-P06-12-at-17.37.01-1024x684.jpeg 1024w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-P06-12-at-17.37.01-300x200.jpeg 300w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-P06-12-at-17.37.01-768x513.jpeg 768w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-P06-12-at-17.37.01-1536x1027.jpeg 1536w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-P06-12-at-17.37.01.jpeg 1616w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>\u201cEs evidente que<strong> la ciberseguridad tradicional<\/strong>, es decir, aquella centrada en tecnolog\u00edas y en sistema propietarios, <strong>ha quedado obsoleta<\/strong>\u201d. Ante esta situaci\u00f3n, desde IBM tienen una visi\u00f3n clara al respecto, y no es otra que \u201c<strong>elevar al analista de ciberseguridad y facilitar su trabajo<\/strong> con las distintas soluciones de ciberseguridad de cada organizaci\u00f3n\u201d.\u00a0 En este rol, la <strong>Inteligencia Artificial<\/strong> embebida permite \u201crealizar investigaciones autom\u00e1ticas para ser consumidas por el analista y as\u00ed <strong>reducir el tiempo de investigaci\u00f3n medio de 2 d\u00edas<\/strong> a menos de 30 minutos\u201d, ha afirmado Trist\u00e1n.<\/p>\n<p><strong>\u201cQue no os suplanten est\u00e1 en vuestras manos\u201d<\/strong><\/p>\n<p>Por su parte, <strong>Pedro \u00c1lamo<\/strong>, Senior Account Manager Public Sector de <strong>Proofpoint<\/strong>, ha destacado <strong>el correo electr\u00f3nico como principal vector a proteger<\/strong> tanto en las organizaciones como en las personas, pues \u201c<strong>el 97% de las brechas de ataque hacia los usuarios son a trav\u00e9s del correo electr\u00f3nico<\/strong>\u201d. \u201c<strong>Que no os suplanten est\u00e1 en vuestras manos<\/strong>\u201d, ha asegurado \u00c1lamo, quien ha puesto sobre la mesa el concepto \u2018<strong><em>happy clickers<\/em><\/strong>\u2019, es decir, ese \u201cusuario incontinente, que clica cualquier link que le llega\u201d y que se deber\u00eda de erradicar. \u201c<strong>La soluci\u00f3n<\/strong> para la protecci\u00f3n del correo electr\u00f3nico radica en tres aspectos: prevenci\u00f3n, detecci\u00f3n y respuesta.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9036 size-large\" src=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-IPmage-2023-06-12-at-17.37.01-1024x684.jpeg\" alt=\"\" width=\"1024\" height=\"684\" srcset=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-IPmage-2023-06-12-at-17.37.01-1024x684.jpeg 1024w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-IPmage-2023-06-12-at-17.37.01-300x200.jpeg 300w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-IPmage-2023-06-12-at-17.37.01-768x513.jpeg 768w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-IPmage-2023-06-12-at-17.37.01-1536x1027.jpeg 1536w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-IPmage-2023-06-12-at-17.37.01.jpeg 1616w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong>Jes\u00fas Rodr\u00edguez<\/strong>, Cybersecurity Sales Specialist-Iberia de <strong>AWS<\/strong>, y <strong>Arancha Jim\u00e9nez<\/strong>, Responsable de Ciberseguridad, Servicios y Producto de <strong>Eviden<\/strong>, han abordado <strong>los riesgos en las plataformas \u2018cloud\u2019 p\u00fablicas<\/strong> y la importancia de la seguridad en este \u00e1mbito. \u201cAWS trabaja para que los clientes siempre tengan el control, lo que se llama la soberan\u00eda de datos y aplicaciones. Esto es, saber d\u00f3nde est\u00e1n sus datos y qui\u00e9n los puede gestionar\u201d, ha sostenido Rodr\u00edguez. El representante de <strong>AWS <\/strong>aboga por \u201c<strong>un servicio de \u2018cloud\u2019 p\u00fablico lo m\u00e1s seguro posible<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9034 size-large\" src=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37P.01-1024x684.jpeg\" alt=\"\" width=\"1024\" height=\"684\" srcset=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37P.01-1024x684.jpeg 1024w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37P.01-300x200.jpeg 300w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37P.01-768x513.jpeg 768w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37P.01-1536x1027.jpeg 1536w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37P.01.jpeg 1616w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>La responsable de ciberseguridad de <strong>Eviden<\/strong>, \u2018partner\u2019 de AWS, ha abogado por la \u201cprevenci\u00f3n, la protecci\u00f3n y la preservaci\u00f3n de la seguridad extremo a extremo\u201d para lograr una seguridad alta en la nube.<\/p>\n<p><strong>\u00a0\u201cLas fronteras de la red resultan m\u00e1s complejas de defender\u201d<\/strong><\/p>\n<p><strong>Jos\u00e9 Capote<\/strong>, Cyber Security And Privacy Officer de <strong>Huawei<\/strong>, ha hablado sobre la gesti\u00f3n de la <strong>seguridad en la era del 5G<\/strong> en la que \u201c<strong>las fronteras de la red <\/strong>se difuminan y <strong>resultan m\u00e1s complejas de defender<\/strong>\u201d. \u201cAmenazas que eran tradicionales, aparecen ahora en redes de comunicaci\u00f3n, estando la soluci\u00f3n en un modelo de responsabilidad compartida con diferentes proveedores que ofrecen unas capacidades al nivel superior\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9030 size-large\" src=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37.01-1024x684.jpeg\" alt=\"\" width=\"1024\" height=\"684\" srcset=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37.01-1024x684.jpeg 1024w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37.01-300x200.jpeg 300w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37.01-768x513.jpeg 768w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37.01-1536x1027.jpeg 1536w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.37.01.jpeg 1616w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>\u201cLa ciberseguridad es un modelo de seguridad compartida de diferentes capas. La importancia de la estandarizaci\u00f3n y la inversi\u00f3n en I+D para ofrecer un plus de control son fundamentales en un entorno industrial cada vez m\u00e1s complejo\u201d, ha resaltado Jos\u00e9 Capote.<\/p>\n<p><strong>\u201cEl 5G en ciberseguridad es ya una realidad\u201d<\/strong><\/p>\n<p>Por \u00faltimo, <strong>Antonio Relvas<\/strong>, Director de Estrategia de Ciberseguridad de ZTE, ha tratado la <strong>seguridad en las redes 5G<\/strong>, a las que considera un producto del futuro que ya est\u00e1 perfectamente integrado en el presente: \u201c<strong>El 5G<\/strong>, como todos los productos, tiene problemas que se tienen que verificar bajo unos est\u00e1ndares internacionales. Sin duda, es bueno para luchar contra los ciberataques y ser\u00e1 m\u00e1s seguro que el 4G. Se trata de una soluci\u00f3n que <strong>ya es una realidad<\/strong>\u201d, ha sentenciado.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9028 size-large\" src=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-1P7.37.41-1024x684.jpeg\" alt=\"\" width=\"1024\" height=\"684\" srcset=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-1P7.37.41-1024x684.jpeg 1024w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-1P7.37.41-300x200.jpeg 300w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-1P7.37.41-768x513.jpeg 768w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-1P7.37.41-1536x1027.jpeg 1536w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-1P7.37.41.jpeg 1616w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Empresas como Telef\u00f3nica Tech, Tesla, ZTE, AWS, Proofpoint y \u2018El Observatorio\u2019 han estado presentes en la zona destinada a las demostraciones en el Palacio de Congresos y Exposiciones. <strong>Tesla <\/strong>ha permitido a los asistentes probar varios <strong>coches inteligentes de \u00faltimo modelo<\/strong> en un circuito cerrado de conducci\u00f3n. Por su parte, <strong>ZTE <\/strong>ha mostrado a los profesionales diferentes pr\u00e1cticas de vanguardia realizadas en los laboratorios. Adem\u00e1s, <strong>AWS <\/strong>cuenta con una <strong>maleta transportadora que evita ciberataques<\/strong>, utilizada en el conflicto de Ucrania. Ma\u00f1ana martes tambi\u00e9n se podr\u00e1 disfrutar de esta \u00e1rea de demostraciones.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9038 size-large\" src=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApPp-Image-2023-06-12-at-17.37.41-1024x684.jpeg\" alt=\"\" width=\"1024\" height=\"684\" srcset=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApPp-Image-2023-06-12-at-17.37.41-1024x684.jpeg 1024w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApPp-Image-2023-06-12-at-17.37.41-300x200.jpeg 300w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApPp-Image-2023-06-12-at-17.37.41-768x513.jpeg 768w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApPp-Image-2023-06-12-at-17.37.41-1536x1027.jpeg 1536w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApPp-Image-2023-06-12-at-17.37.41.jpeg 1616w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Todas las conferencias de esta jornada y las de todo el evento se pueden seguir por &#8216;<a href=\"https:\/\/www.thenewtechobservatory.com\/inicio.aspx\">El Observatorio<\/a>&#8216;, plataforma lanzada por Medina Media Events. Esta primera edici\u00f3n del \u2018CSI Radar\u2019 est\u00e1 impulsada por <strong>Telef\u00f3nica Tech, Sevilla City Office y FIBES, y cuenta con el apoyo de AWS, Proofpoint, Huawei, ZTE, IBM, Cremades &amp; Calvo-Sotelo y \u2018El Observatorio\u2019.<\/strong><\/p>\n<p>La sesi\u00f3n presencial de ma\u00f1ana <strong>martes <\/strong>comenzar\u00e1 a las <strong>10 horas en FIBES<\/strong> y contar\u00e1 con las intervenciones de <strong>Luis Hidalgo<\/strong> de <strong>Incibe<\/strong>, <strong>Juan Miguel Pulpillo<\/strong> del <strong>CCI<\/strong>, <strong>Sergio de los Santos<\/strong> de <strong>Telef\u00f3nica Tech<\/strong>, <strong>Juan Salom<\/strong> de la <strong>Guardia Civil<\/strong>, <strong>Jos\u00e9 Gir\u00f3n<\/strong> de la <strong>Polic\u00eda Nacional<\/strong> y <strong>Eloy<\/strong> <strong>Sanz <\/strong>de la <strong>Agencia Digital de Andaluc\u00eda<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Isabel Trist\u00e1n, Directora de Ventas de Software de Seguridad de IBM afirma que \u201cla ciberseguridad tradicional ha quedado obsoleta\u201d y aboga por elevar la figura \u201cdel analista de ciberseguridad y facilitar su trabajo\u201d. Pedro \u00c1lamo, Senior Account Manager Public Sector de Proofpoint: \u201cEl 97% de las brechas de ataque hacia los usuarios son a trav\u00e9s [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9040,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[100],"tags":[227,226,228,262,242],"class_list":["post-9025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-evento","tag-ciberseguridad","tag-csi-radar","tag-fibes","tag-ibm","tag-sevilla"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d - CSI Radar<\/title>\n<meta name=\"description\" content=\"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d - CSI Radar\" \/>\n<meta property=\"og:description\" content=\"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/\" \/>\n<meta property=\"og:site_name\" content=\"CSI Radar\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-12T16:20:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1616\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"MME\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"MME\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/\"},\"author\":{\"name\":\"MME\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#\\\/schema\\\/person\\\/d3ac8a54c8020e3f50f5f0a4a7dd72da\"},\"headline\":\"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d\",\"datePublished\":\"2023-06-12T16:20:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/\"},\"wordCount\":1072,\"publisher\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg\",\"keywords\":[\"ciberseguridad\",\"csi radar\",\"fibes\",\"ibm\",\"sevilla\"],\"articleSection\":[\"Evento\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/\",\"name\":\"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d - CSI Radar\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg\",\"datePublished\":\"2023-06-12T16:20:20+00:00\",\"description\":\"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/#primaryimage\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg\",\"contentUrl\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg\",\"width\":1616,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/csiaradar.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#website\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/\",\"name\":\"CSI Radar\",\"description\":\"Cyber Security International\",\"publisher\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/csiaradar.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#organization\",\"name\":\"SUTUS\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sutuscolor.png\",\"contentUrl\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sutuscolor.png\",\"width\":268,\"height\":85,\"caption\":\"SUTUS\"},\"image\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#\\\/schema\\\/person\\\/d3ac8a54c8020e3f50f5f0a4a7dd72da\",\"name\":\"MME\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d - CSI Radar","description":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/","og_locale":"es_ES","og_type":"article","og_title":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d - CSI Radar","og_description":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d","og_url":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/","og_site_name":"CSI Radar","article_published_time":"2023-06-12T16:20:20+00:00","og_image":[{"width":1616,"height":1080,"url":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg","type":"image\/jpeg"}],"author":"MME","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"MME","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/#article","isPartOf":{"@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/"},"author":{"name":"MME","@id":"https:\/\/csiaradar.com\/#\/schema\/person\/d3ac8a54c8020e3f50f5f0a4a7dd72da"},"headline":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d","datePublished":"2023-06-12T16:20:20+00:00","mainEntityOfPage":{"@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/"},"wordCount":1072,"publisher":{"@id":"https:\/\/csiaradar.com\/#organization"},"image":{"@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/#primaryimage"},"thumbnailUrl":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg","keywords":["ciberseguridad","csi radar","fibes","ibm","sevilla"],"articleSection":["Evento"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/","url":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/","name":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d - CSI Radar","isPartOf":{"@id":"https:\/\/csiaradar.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/#primaryimage"},"image":{"@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/#primaryimage"},"thumbnailUrl":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg","datePublished":"2023-06-12T16:20:20+00:00","description":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d","breadcrumb":{"@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/#primaryimage","url":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg","contentUrl":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-12-at-17.38.32.jpeg","width":1616,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/csiaradar.com\/cybercriminals-are-capable-of-attacking-in-less-than-three-days\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/csiaradar.com\/es\/"},{"@type":"ListItem","position":2,"name":"\u201cLos cibercriminales son capaces de atacar en menos de tres d\u00edas\u201d"}]},{"@type":"WebSite","@id":"https:\/\/csiaradar.com\/#website","url":"https:\/\/csiaradar.com\/","name":"CSI Radar","description":"Cyber Security International","publisher":{"@id":"https:\/\/csiaradar.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csiaradar.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/csiaradar.com\/#organization","name":"SUTUS","url":"https:\/\/csiaradar.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/csiaradar.com\/#\/schema\/logo\/image\/","url":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2019\/01\/sutuscolor.png","contentUrl":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2019\/01\/sutuscolor.png","width":268,"height":85,"caption":"SUTUS"},"image":{"@id":"https:\/\/csiaradar.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/csiaradar.com\/#\/schema\/person\/d3ac8a54c8020e3f50f5f0a4a7dd72da","name":"MME"}]}},"_links":{"self":[{"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/posts\/9025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/comments?post=9025"}],"version-history":[{"count":0,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/posts\/9025\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/media\/9040"}],"wp:attachment":[{"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/media?parent=9025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/categories?post=9025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/tags?post=9025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}