{"id":812,"date":"2023-11-20T08:37:16","date_gmt":"2023-11-20T08:37:16","guid":{"rendered":"https:\/\/www.etek.com\/?page_id=812"},"modified":"2024-03-05T10:03:30","modified_gmt":"2024-03-05T10:03:30","slug":"blogs","status":"publish","type":"page","link":"https:\/\/etek.com\/es\/blogs\/","title":{"rendered":"Blogs"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"812\" class=\"elementor elementor-812\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2dd9ccc e-flex e-con-boxed e-con e-parent\" data-id=\"2dd9ccc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-040f13b elementor-widget elementor-widget-text-editor\" data-id=\"040f13b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\tInicio > <strong>Blogs<\/strong>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-115a427 elementor-widget elementor-widget-heading\" data-id=\"115a427\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">BLOGS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad08ded e-flex e-con-boxed e-con e-parent\" data-id=\"ad08ded\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e39d67f elementor-widget elementor-widget-heading\" data-id=\"e39d67f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">ETEK BLOGS<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee94bee elementor-widget elementor-widget-heading\" data-id=\"ee94bee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n\u00daltimas actualizaciones de\n <br> Industria de la ciberseguridad<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fe378f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7fe378f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9fef72e e-con-full e-flex e-con e-parent\" data-id=\"9fef72e\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t<div class=\"elementor-element elementor-element-88151fa e-con-full e-flex e-con e-child\" data-id=\"88151fa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8b4563 elementor-widget elementor-widget-heading\" data-id=\"b8b4563\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Search<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c004262 elementor-search-form--skin-classic elementor-search-form--button-type-icon elementor-search-form--icon-search elementor-widget elementor-widget-search-form\" data-id=\"c004262\" data-element_type=\"widget\" data-settings=\"{&quot;skin&quot;:&quot;classic&quot;}\" data-widget_type=\"search-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/etek.com\/es\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-theme-elements.min.css\">\t\t<form class=\"elementor-search-form\" action=\"https:\/\/etek.com\/es\" method=\"get\" role=\"search\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-search-form__container\">\n\t\t\t\t<label class=\"elementor-screen-only\" for=\"elementor-search-form-c004262\">Search<\/label>\n\n\t\t\t\t\n\t\t\t\t<input id=\"elementor-search-form-c004262\" placeholder=\"Search...\" class=\"elementor-search-form__input\" type=\"search\" name=\"s\" value=\"\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<button class=\"elementor-search-form__submit\" type=\"submit\" aria-label=\"Search\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-font-icon-svg-container\"><svg class=\"fa fa-search e-font-icon-svg e-fas-search\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z\"><\/path><\/svg><\/div>\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Search<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25bff9f elementor-widget elementor-widget-heading\" data-id=\"25bff9f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Recent posts<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e4bcb7 elementor-widget elementor-widget-elementskit-post-list\" data-id=\"1e4bcb7\" data-element_type=\"widget\" data-widget_type=\"elementskit-post-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >\t\t<ul class=\"elementor-icon-list-items ekit-post-list-wrapper \">\n\t\t\t\t\t\t<li class=\"elementor-icon-list-item   \">\n\t\t\t\t<a href=\"https:\/\/etek.com\/es\/soctradicional-socinteligente\/\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit_post_list_content_wraper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Evolucionando del SOC Tradicional al SOC Inteligente: C\u00f3mo Integrar IA para Detectar Amenazas en Tiempo Real<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t<\/li>\n\t\t\t\t\t<li class=\"elementor-icon-list-item   \">\n\t\t\t\t<a href=\"https:\/\/etek.com\/es\/ciberataques-autonomos-ia\/\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit_post_list_content_wraper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ciberataques Aut\u00f3nomos: \u00bfPuede la IA Desencadenar la Pr\u00f3xima Ola de Amenazas Cibern\u00e9ticas?<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t<\/li>\n\t\t\t\t\t<li class=\"elementor-icon-list-item   \">\n\t\t\t\t<a href=\"https:\/\/etek.com\/es\/celebramos-el-mes-de-la-ciberseguridad\/\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit_post_list_content_wraper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\u00a1Celebramos el mes de la ciberseguridad!<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t<\/li>\n\t\t\t\t\t<li class=\"elementor-icon-list-item   \">\n\t\t\t\t<a href=\"https:\/\/etek.com\/es\/la-automatizacion-revoluciona-la-proteccion-de-datos\/\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit_post_list_content_wraper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">La Automatizaci\u00f3n Revoluciona la Protecci\u00f3n de Datos<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t<\/li>\n\t\t\t\t\t<li class=\"elementor-icon-list-item   \">\n\t\t\t\t<a href=\"https:\/\/etek.com\/es\/aixdr-soc-la-clave-para-una-ciberdefensa-proactiva-en-el-futuro-digital\/\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit_post_list_content_wraper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">aiXDR SOC: La clave para una ciberdefensa proactiva en el futuro digital<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0609544 elementor-widget elementor-widget-heading\" data-id=\"0609544\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Social Share<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc720d3 elementor-widget elementor-widget-elementskit-social-share\" data-id=\"dc720d3\" data-element_type=\"widget\" data-widget_type=\"elementskit-social-share.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >\t\t<ul class=\"ekit_socialshare\">\n                            <li class=\"elementor-repeater-item-8acaad7\" data-social=\"facebook\">\n                    <a class=\"facebook\">\n                        \n                        <i aria-hidden=\"true\" class=\"icon icon-facebook\"><\/i>                        \n                                                                                            <\/a>\n                <\/li>\n                                            <li class=\"elementor-repeater-item-4293c82\" data-social=\"twitter\">\n                    <a class=\"twitter\">\n                        \n                        <i aria-hidden=\"true\" class=\"icon icon-twitter\"><\/i>                        \n                                                                                            <\/a>\n                <\/li>\n                                            <li class=\"elementor-repeater-item-419c0b1\" data-social=\"linkedin\">\n                    <a class=\"linkedin\">\n                        \n                        <i aria-hidden=\"true\" class=\"icon icon-linkedin\"><\/i>                        \n                                                                                            <\/a>\n                <\/li>\n                                    <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a1ca2c5 e-con-full e-flex e-con e-child\" data-id=\"a1ca2c5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dee5687 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-elementskit-blog-posts\" data-id=\"dee5687\" data-element_type=\"widget\" data-widget_type=\"elementskit-blog-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <div id=\"post-items--dee5687\" class=\"row post-items\">\n                    <div class=\"col-md-12\">\n\n                                    <div class=\"elementskit-blog-block-post\">\n                        <div class=\"row no-gutters\">\n                                                            <div class=\"col-md-6 order-1\">\n                                    <a href=\"https:\/\/etek.com\/es\/celebramos-el-mes-de-la-ciberseguridad\/\" class=\"elementskit-entry-thumb\">\n                                        <img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3-1024x576.png\" alt=\"\u00a1Celebramos el mes de la ciberseguridad!\">\n                                    <\/a><!-- .elementskit-entry-thumb END -->\n                                <\/div>\n                            \n                            <div class=\"col-md-6 order-2\">\n                                <div class=\"elementskit-post-body \">\n                                    <div class=\"elementskit-entry-header\">\n                                        \n                                                                                            \t\t\t\t\t                                            \n                                            \n                                                                                            \t\t\t\t<h2 class=\"entry-title\">\n\t\t\t\t\t<a href=\"https:\/\/etek.com\/es\/celebramos-el-mes-de-la-ciberseguridad\/\">\n\t\t\t\t\t\t\u00a1Celebramos el mes de la ciberseguridad!\t\t\t\t\t<\/a>\n\t\t\t\t<\/h2>\n\t\t\t                                                                                <\/div><!-- .elementskit-entry-header END -->\n\n                                                                            <div class=\"elementskit-post-footer\">\n                                                                                            <p>Hoy marcamos la culminaci\u00f3n de 31 d\u00edas dedicados a fortalecer la ciberseguridad, un pilar esencial en la era digital en la que nos encontramos. Este mes ha sido una ventana para resaltar la importancia de la resiliencia digital, la educaci\u00f3n y la colaboraci\u00f3n continua entre todos los actores involucrados. Nos invita a reflexionar sobre los [&hellip;]<\/p>\n                                                                                                                                <\/div><!-- .elementskit-post-footer END -->\n                                                                    <\/div><!-- .elementskit-post-body END -->\n                            <\/div>\n                        <\/div>\n                    <\/div><!-- .elementskit-blog-block-post .radius .gradient-bg END -->\n                \n            <\/div>\n                    <div class=\"col-md-12\">\n\n                                    <div class=\"elementskit-blog-block-post\">\n                        <div class=\"row no-gutters\">\n                                                            <div class=\"col-md-6 order-1\">\n                                    <a href=\"https:\/\/etek.com\/es\/la-automatizacion-revoluciona-la-proteccion-de-datos\/\" class=\"elementskit-entry-thumb\">\n                                        <img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1-1024x576.jpg\" alt=\"La Automatizaci\u00f3n Revoluciona la Protecci\u00f3n de Datos\">\n                                    <\/a><!-- .elementskit-entry-thumb END -->\n                                <\/div>\n                            \n                            <div class=\"col-md-6 order-2\">\n                                <div class=\"elementskit-post-body \">\n                                    <div class=\"elementskit-entry-header\">\n                                        \n                                                                                            \t\t\t\t\t                                            \n                                            \n                                                                                            \t\t\t\t<h2 class=\"entry-title\">\n\t\t\t\t\t<a href=\"https:\/\/etek.com\/es\/la-automatizacion-revoluciona-la-proteccion-de-datos\/\">\n\t\t\t\t\t\tLa Automatizaci\u00f3n Revoluciona la Protecci\u00f3n de Datos\t\t\t\t\t<\/a>\n\t\t\t\t<\/h2>\n\t\t\t                                                                                <\/div><!-- .elementskit-entry-header END -->\n\n                                                                            <div class=\"elementskit-post-footer\">\n                                                                                            <p>En el mundo de la ciberseguridad, las amenazas de fuga de datos son una realidad omnipresente que desaf\u00eda constantemente a las organizaciones modernas. Como l\u00edderes en ciberseguridad, enfrentamos la imperiosa necesidad de adoptar estrategias innovadoras y efectivas para salvaguardar los datos confidenciales y la reputaci\u00f3n de nuestras empresas. Hoy, deseamos destacar una poderosa herramienta que [&hellip;]<\/p>\n                                                                                                                                <\/div><!-- .elementskit-post-footer END -->\n                                                                    <\/div><!-- .elementskit-post-body END -->\n                            <\/div>\n                        <\/div>\n                    <\/div><!-- .elementskit-blog-block-post .radius .gradient-bg END -->\n                \n            <\/div>\n                    <div class=\"col-md-12\">\n\n                                    <div class=\"elementskit-blog-block-post\">\n                        <div class=\"row no-gutters\">\n                                                            <div class=\"col-md-6 order-1\">\n                                    <a href=\"https:\/\/etek.com\/es\/aixdr-soc-la-clave-para-una-ciberdefensa-proactiva-en-el-futuro-digital\/\" class=\"elementskit-entry-thumb\">\n                                        <img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1024x576.png\" alt=\"aiXDR SOC: La clave para una ciberdefensa proactiva en el futuro digital\">\n                                    <\/a><!-- .elementskit-entry-thumb END -->\n                                <\/div>\n                            \n                            <div class=\"col-md-6 order-2\">\n                                <div class=\"elementskit-post-body \">\n                                    <div class=\"elementskit-entry-header\">\n                                        \n                                                                                            \t\t\t\t\t                                            \n                                            \n                                                                                            \t\t\t\t<h2 class=\"entry-title\">\n\t\t\t\t\t<a href=\"https:\/\/etek.com\/es\/aixdr-soc-la-clave-para-una-ciberdefensa-proactiva-en-el-futuro-digital\/\">\n\t\t\t\t\t\taiXDR SOC: La clave para una ciberdefensa proactiva en el futuro digital\t\t\t\t\t<\/a>\n\t\t\t\t<\/h2>\n\t\t\t                                                                                <\/div><!-- .elementskit-entry-header END -->\n\n                                                                            <div class=\"elementskit-post-footer\">\n                                                                                            <p>La ciberseguridad se ha convertido en un pilar fundamental para proteger los activos m\u00e1s valiosos de una organizaci\u00f3n: sus datos y su reputaci\u00f3n. Sin embargo, mientras nuestras empresas avanzan hacia la transformaci\u00f3n digital y la conectividad global, las amenazas cibern\u00e9ticas tambi\u00e9n evolucionan, desafiando nuestra capacidad para mantenernos a la vanguardia en materia de protecci\u00f3n.&nbsp; Como [&hellip;]<\/p>\n                                                                                                                                <\/div><!-- .elementskit-post-footer END -->\n                                                                    <\/div><!-- .elementskit-post-body END -->\n                            <\/div>\n                        <\/div>\n                    <\/div><!-- .elementskit-blog-block-post .radius .gradient-bg END -->\n                \n            <\/div>\n                <\/div>\n       <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e88113c elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-widget elementor-widget-posts\" data-id=\"e88113c\" data-element_type=\"widget\" data-settings=\"{&quot;pagination_type&quot;:&quot;numbers_and_prev_next&quot;,&quot;classic_columns&quot;:&quot;3&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/etek.com\/es\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-posts.min.css\">\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-8231 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/etek.com\/es\/soctradicional-socinteligente\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-39-300x169.png\" class=\"attachment-medium size-medium wp-image-8240\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-39-300x169.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-39-1024x576.png 1024w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-39-768x432.png 768w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-39-370x208.png 370w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-39-770x433.png 770w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-39-1536x864.png 1536w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-39.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/etek.com\/es\/soctradicional-socinteligente\/\" >\n\t\t\t\tEvolucionando del SOC Tradicional al SOC Inteligente: C\u00f3mo Integrar IA para Detectar Amenazas en Tiempo Real\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJuly 22, 2024\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Evolucionando del SOC Tradicional al SOC Inteligente: C\u00f3mo Integrar IA para Detectar Amenazas en Tiempo Real &nbsp; El panorama de ciberseguridad ha cambiado dr\u00e1sticamente en<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/etek.com\/es\/soctradicional-socinteligente\/\" aria-label=\"Read more about Evolucionando del SOC Tradicional al SOC Inteligente: C\u00f3mo Integrar IA para Detectar Amenazas en Tiempo Real\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-8229 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/etek.com\/es\/ciberataques-autonomos-ia\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-38-300x169.png\" class=\"attachment-medium size-medium wp-image-8243\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-38-300x169.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-38-1024x576.png 1024w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-38-768x432.png 768w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-38-370x208.png 370w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-38-770x433.png 770w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-38-1536x864.png 1536w, https:\/\/etek.com\/es\/wp-content\/uploads\/2024\/07\/Article-Mon-28Th-May-2024-38.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/etek.com\/es\/ciberataques-autonomos-ia\/\" >\n\t\t\t\tCiberataques Aut\u00f3nomos: \u00bfPuede la IA Desencadenar la Pr\u00f3xima Ola de Amenazas Cibern\u00e9ticas?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJuly 22, 2024\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Ciberataques Aut\u00f3nomos: \u00bfPuede la IA Desencadenar la Pr\u00f3xima Ola de Amenazas Cibern\u00e9ticas? Introducci\u00f3n La inteligencia artificial (IA) ha revolucionado muchos aspectos de la vida moderna,<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/etek.com\/es\/ciberataques-autonomos-ia\/\" aria-label=\"Read more about Ciberataques Aut\u00f3nomos: \u00bfPuede la IA Desencadenar la Pr\u00f3xima Ola de Amenazas Cibern\u00e9ticas?\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6518 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/etek.com\/es\/celebramos-el-mes-de-la-ciberseguridad\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3-300x169.png\" class=\"attachment-medium size-medium wp-image-7420\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3-300x169.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3-1024x576.png 1024w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3-768x432.png 768w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3-370x208.png 370w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3-770x433.png 770w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3-1536x864.png 1536w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-3.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/etek.com\/es\/celebramos-el-mes-de-la-ciberseguridad\/\" >\n\t\t\t\t\u00a1Celebramos el mes de la ciberseguridad!\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tOctober 31, 2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Hoy marcamos la culminaci\u00f3n de 31 d\u00edas dedicados a fortalecer la ciberseguridad, un pilar esencial en la era digital en la que nos encontramos. Este<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/etek.com\/es\/celebramos-el-mes-de-la-ciberseguridad\/\" aria-label=\"Read more about \u00a1Celebramos el mes de la ciberseguridad!\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6513 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/etek.com\/es\/la-automatizacion-revoluciona-la-proteccion-de-datos\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1-300x169.jpg\" class=\"attachment-medium size-medium wp-image-7418\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1-300x169.jpg 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1-1024x576.jpg 1024w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1-768x432.jpg 768w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1-370x208.jpg 370w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1-770x433.jpg 770w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1-1536x864.jpg 1536w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/etek.com\/es\/la-automatizacion-revoluciona-la-proteccion-de-datos\/\" >\n\t\t\t\tLa Automatizaci\u00f3n Revoluciona la Protecci\u00f3n de Datos\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tOctober 26, 2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>En el mundo de la ciberseguridad, las amenazas de fuga de datos son una realidad omnipresente que desaf\u00eda constantemente a las organizaciones modernas. Como l\u00edderes<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/etek.com\/es\/la-automatizacion-revoluciona-la-proteccion-de-datos\/\" aria-label=\"Read more about La Automatizaci\u00f3n Revoluciona la Protecci\u00f3n de Datos\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6510 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/etek.com\/es\/aixdr-soc-la-clave-para-una-ciberdefensa-proactiva-en-el-futuro-digital\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-300x169.png\" class=\"attachment-medium size-medium wp-image-7422\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-300x169.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1024x576.png 1024w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-768x432.png 768w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-370x208.png 370w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-770x433.png 770w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template-1536x864.png 1536w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/10\/Blogs-Template.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/etek.com\/es\/aixdr-soc-la-clave-para-una-ciberdefensa-proactiva-en-el-futuro-digital\/\" >\n\t\t\t\taiXDR SOC: La clave para una ciberdefensa proactiva en el futuro digital\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tOctober 19, 2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>La ciberseguridad se ha convertido en un pilar fundamental para proteger los activos m\u00e1s valiosos de una organizaci\u00f3n: sus datos y su reputaci\u00f3n. Sin embargo,<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/etek.com\/es\/aixdr-soc-la-clave-para-una-ciberdefensa-proactiva-en-el-futuro-digital\/\" aria-label=\"Read more about aiXDR SOC: La clave para una ciberdefensa proactiva en el futuro digital\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6487 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/etek.com\/es\/ciberseguridad-proactiva-el-escudo-del-mundo-moderno\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/09\/Blogs-Template-1-300x169.png\" class=\"attachment-medium size-medium wp-image-7433\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/09\/Blogs-Template-1-300x169.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/09\/Blogs-Template-1-1024x576.png 1024w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/09\/Blogs-Template-1-768x432.png 768w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/09\/Blogs-Template-1-370x208.png 370w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/09\/Blogs-Template-1-770x433.png 770w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/09\/Blogs-Template-1-1536x864.png 1536w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/09\/Blogs-Template-1.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/etek.com\/es\/ciberseguridad-proactiva-el-escudo-del-mundo-moderno\/\" >\n\t\t\t\tCiberseguridad Proactiva: el escudo del mundo moderno\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tSeptember 28, 2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>En el mundo globalizado en el que vivimos, la ciberseguridad se ha convertido en una preocupaci\u00f3n tanto para individuos como para organizaciones. La tecnolog\u00eda y<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/etek.com\/es\/ciberseguridad-proactiva-el-escudo-del-mundo-moderno\/\" aria-label=\"Read more about Ciberseguridad Proactiva: el escudo del mundo moderno\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<div class=\"e-load-more-anchor\" data-page=\"1\" data-max-page=\"20\" data-next-page=\"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812\/page\/2\/\"><\/div>\n\t\t\t\t<nav class=\"elementor-pagination\" aria-label=\"Pagination\">\n\t\t\t<span class=\"page-numbers prev\">&laquo; Previous<\/span>\n<span aria-current=\"page\" class=\"page-numbers current\"><span class=\"elementor-screen-only\">Page<\/span>1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812\/page\/2\/\"><span class=\"elementor-screen-only\">Page<\/span>2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812\/page\/3\/\"><span class=\"elementor-screen-only\">Page<\/span>3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812\/page\/4\/\"><span class=\"elementor-screen-only\">Page<\/span>4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812\/page\/5\/\"><span class=\"elementor-screen-only\">Page<\/span>5<\/a>\n<a class=\"page-numbers next\" href=\"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812\/page\/2\/\">Next &raquo;<\/a>\t\t<\/nav>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Inicio > Blogs BLOGS ETEK BLOGS \u00daltimas actualizaciones de Industria de la ciberseguridad Search Recent posts \u00a1Celebramos el mes de la ciberseguridad! La Automatizaci\u00f3n Revoluciona la Protecci\u00f3n de Datos aiXDR SOC: La clave para una ciberdefensa proactiva en el futuro digital Ciberseguridad Proactiva: el escudo del mundo moderno aiXDR: Automatizaci\u00f3n en la detecci\u00f3n de amenazas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812"}],"collection":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/comments?post=812"}],"version-history":[{"count":31,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812\/revisions"}],"predecessor-version":[{"id":8238,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/pages\/812\/revisions\/8238"}],"wp:attachment":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/media?parent=812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}