{"id":10940,"date":"2017-05-08T22:11:21","date_gmt":"2017-05-08T22:11:21","guid":{"rendered":"https:\/\/www.cloudseguro.co\/\/?page_id=10940"},"modified":"2021-11-04T15:11:24","modified_gmt":"2021-11-04T15:11:24","slug":"webinar-y-videos","status":"publish","type":"page","link":"https:\/\/www.cloudseguro.co\/webinar-y-videos\/","title":{"rendered":"Webinar y Videos"},"content":{"rendered":"

[vc_row][vc_column][mk_padding_divider size=\u00bb60″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb45″ margin_bottom=\u00bb18″ font_family=\u00bbnone\u00bb align=\u00bbcenter\u00bb]Webinar y videos[\/mk_fancy_title][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb26″ margin_bottom=\u00bb18″ font_family=\u00bbnone\u00bb align=\u00bbcenter\u00bb]<\/p>\n

Aprende con nuestros Webinar y contenido en
\nvideo de nuestro canal de Cloud Seguro en YouTube<\/a>. Revive los eventos de forma digital o presenciales.<\/p><\/blockquote>\n

[\/mk_fancy_title][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=heg1-07GPKI\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

UserRecon herramienta de OSINT<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636037577574{margin-bottom: 0px !important;}\u00bb]Conoce UserRecon herramienta de OSINT.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=heg1-07GPKI\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=6wdjNdpT6EI\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

\u00bfQu\u00e9 es un Firewall?<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636037278299{margin-bottom: 0px !important;}\u00bb]Conoce que es un Firewall[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=6wdjNdpT6EI\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=cWx45EhfT5Q\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Conoce OSINT Framework<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636037114042{margin-bottom: 0px !important;}\u00bb]Conoce OSINT Framework, un repositorio con herramientas OSINT[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=cWx45EhfT5Q\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=w42GQGaCFZo\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Dispositivos de Almacenamiento de Contrase\u00f1as<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636037305482{margin-bottom: 0px !important;}\u00bb]Te presentamos un dispositivo f\u00edsico para almacenar contrase\u00f1as.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=w42GQGaCFZo\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=vdYslTp0aug\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Libros recomendados en Ciberseguridad<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636036967447{margin-bottom: 0px !important;}\u00bb]Te presentamos algunos libros recomendados en temas de ciberseguridad.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=vdYslTp0aug\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=Lz9EVD26imU\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Tendencias de Seguridad en la Nube<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636037736463{margin-bottom: 0px !important;}\u00bb]Tendencias de Seguridad en la Nube[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=Lz9EVD26imU\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=i6aFnE9_ZVg\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Conoce Maltego herramienta de OSINT<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636036408093{margin-bottom: 0px !important;}\u00bb]Conoce MALTEGO, herramienta para automatizar b\u00fasquedas de OSINT.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=i6aFnE9_ZVg\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=GrpJvX9vArY\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Ataque de SQL Injection e implementando WAF de AWS<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636036195135{margin-bottom: 0px !important;}\u00bb]En el siguiente video te mostramos como es un ataque de SQL Injection y como se implementa un WAF de AWS, para mitigarlo.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=GrpJvX9vArY\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=muFZxi4HMrw\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

OWASP Juice Shop en AWS<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1636035961497{margin-bottom: 0px !important;}\u00bb]Conoce como implementar Juice Shop en AWS[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=1vTyl2vUR2s\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=4X7am7gHeC8″][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

El ciclo de la Seguridad de Cloud Seguro<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1623786650543{margin-bottom: 0px !important;}\u00bb]Cloud Seguro explica en este video el ciclo de Seguridad de la Informaci\u00f3n que involucra documentaci\u00f3n, controles t\u00e9cnicos, seguridad en la nube y la gesti\u00f3n de un SGSI.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=4X7am7gHeC8″ align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=FHMdcz7iH8U\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

\u00bfQu\u00e9 son las VPN?<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1623786503324{margin-bottom: 0px !important;}\u00bb]En el siguiente video te explicamos sobre las VPN.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=FHMdcz7iH8U\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=GCCkTN9uoKE\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Fases de un Ciberataque<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1623786352580{margin-bottom: 0px !important;}\u00bb]Conoce en el siguiente video la metodolog\u00eda de un Ciberataque.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=1vTyl2vUR2s\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=UAztM-gCOC4″][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Certificando una empresa en la ISO27001<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1598412264278{margin-bottom: 0px !important;}\u00bb]Conoce en el siguiente video la forma de certificar una empresa en la norma ISO27001[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=1vTyl2vUR2s\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=KbZU6L4ApzY\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Seguridad en la nube de AWS, conceptos esenciales<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb css=\u00bb.vc_custom_1598412136796{margin-bottom: 0px !important;}\u00bb]Te mostramos en el siguiente video algunos conceptos esenciales de la nube de AWS[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=1vTyl2vUR2s\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=1vTyl2vUR2s\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Implementando AWS WorkSpaces en pocos minutos<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Te mostramos en el siguiente video como implementar WorkSpaces en pocos minutos. Venimos trabajando con distintos sectores para implementar Escritorios en la nube de forma sencilla y para un Teletrabajo Seguro[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=1vTyl2vUR2s\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video puedes Escr\u00edbirnos a contacto@cloudseguro.co
\n[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=DFGZs7m5i84″][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Protecci\u00f3n de aplicaciones en EC2 de AWS contra ataques DOS\u00a0<\/span><\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Te mostramos como proteger aplicaciones en EC2 de Amazon Web Services, contra ataques de denegaci\u00f3n del servicio (DOS).[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=DFGZs7m5i84″ align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video
\n[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=HlSUGZesyUc\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

El limite de OSINT en las carpetas Secretas<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]El limite de OSINT (Open Source Intelligence), b\u00fasqueda de informaci\u00f3n en fuentes p\u00fablicas. Analizando el caso colombiano de la investigaci\u00f3n de la revista semana denominado \u00abLas carpetas secretas\u00bb. <\/span>https:\/\/www.semana.com\/nacion\/articul…<\/a>.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=HlSUGZesyUc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video
\n[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=tXeu5Tdxe1Y\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Seguridad Inform\u00e1tica como Proceso<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]La Seguridad Inform\u00e1tica es un proceso para todo tipo de empresas. Conoce en el siguiente video como la seguridad es un proceso documentado y de cultura.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=tXeu5Tdxe1Y\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video
\n[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=ZDrkKrRQ3OE\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Son seguros servicios como Zoom o Jitsi<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Conoce lo que pasa con plataformas de comunicaci\u00f3n como Zoom o Jitsi.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=ZDrkKrRQ3OE\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video
\n[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=07kZsttBY6E\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Trabajar Remoto Seguro con WorkSpaces<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Conoce WorkSpaces una herramienta para temas de Teletrabajo. Con Cloud Seguro te apoyamos en la implementaci\u00f3n para un Teletrabajo seguro.[\/vc_column_text][mk_button size=\u00bblarge\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=07kZsttBY6E\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video y cualquier duda puedes escribirnos contacto@cloudseguro.co<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=wPLPbIYfrvQ\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Instalando Kali Linux en AWS<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Aprende como instalar Kali Linux sistema operativo de Seguridad Inform\u00e1tica en AWS.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=wPLPbIYfrvQ\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=1nAwwfrVUCk\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Seguridad de la Informaci\u00f3n en tiempos de COVID-19<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Revive el webinar de Seguridad de la Informaci\u00f3n en tiempos de COVID-19, realizado el pasado 27 de marzo de 2020. El cual tuvo la participaci\u00f3n del equipo de cloud seguro como de Daniel Torres y TacticalEdge[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=1nAwwfrVUCk\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Webinar realizado..<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=VaYnCnhvyzo\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Diferencias entre An\u00e1lisis de vulnerabilidades y Ethical Hacking<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Conoce las diferencias entre An\u00e1lisis de Vulnerabilidades y Ethical Hacking. Es una necesidad de las empresas realizar alguno de estas dos de forma peri\u00f3dica con cloud seguro te podemos apoyar con el mejor equipo.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=VaYnCnhvyzo\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=ZLBB8tAU7gk\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Mujeres en Ciberseguridad<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Revive algunos momentos de Mi\u00e9rcoles de Seguridad en donde tuvimos la tem\u00e1tica de \u00abMujeres en la Ciberseguridad\u00bb.[\/vc_column_text][mk_button corner_style=\u00bbrounded\u00bb size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/www.youtube.com\/watch?v=ZLBB8tAU7gk\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver algunos momentos del evento..<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=pcIX1UX_5_8″][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Gesti\u00f3n de Riesgo<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Gesti\u00f3n del Riesgo una necesidad de todos los d\u00edas.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=48QAEvXCcbg\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Tendencias 2019 y 2020 en Ciberseguridad<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]En el siguiente video de Manuela Guarnizo y Liliana Toro de Cloud Seguro se muestra un resumen de tendencias en 2019 en Ciberseguridad y Seguridad de la Informaci\u00f3n, \u00a0mujeres en ciberseguridad, como algunos temas de seguridad de la informaci\u00f3n que dar\u00e1n qu\u00e9 hablar en el 2020.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=1JNwYXjAza8″][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Limpieza de Metadatos<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Limpiando Metadatos en archivos PDF y Office, con la herramienta Becypdfmetaedit<\/strong>[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=3sS-R9bRPdU\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Hacking Drone Tello<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Hacking a un drone Tello desde la misma red del Drone. Utilizando el SDK.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=xR4UFXDdgnY\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Aquatone herramienta de OSINT<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]En el siguiente video te explicamos la b\u00fasqueda de Subdominios con la herramienta AQUATONE, la cual se puede utilizar en Kali Linux. La principal caracter\u00edstica de AQUATONE es descubrir subdominios, y permite el escaneo de puertos m\u00e1s comunes y la generaci\u00f3n de reportes. Es una buena herramienta par temas de OSINT, y procesos de seguridad de la informaci\u00f3n[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=FXeceGebbWk&t=47s\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Mi\u00e9rcoles de Seguridad, Inform\u00e1tica Forense<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Un resumen de Mi\u00e9rcoles de Seguridad, realizado con el apoyo de la ESTIC, de la Polic\u00eda Nacional.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=Ym66uv9dWzo\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Circular 005, Seguridad en la Nube<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Conoce la Circular 005 de la Superfinanciera de Seguridad en la Nube, y como en Cloud Seguro te podemos apoyar.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/www.youtube.com\/watch?v=tQ02njbAQlc\u00bb][mk_padding_divider][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Diferencias Seguridad de la informaci\u00f3n, Seguridad Inform\u00e1tica y Privacidad<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Diferencias entre Seguridad de la Informaci\u00f3n, Seguridad Inform\u00e1tica y Privacidad.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Retos del CISO, (Oficial de Seguridad)<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Retos del CISO (Chief Information Security Officer), o el Oficial de Seguridad de la Informaci\u00f3n en las empresas.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/pQkzFMme5uc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_divider style=\u00bbshadow_line\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/CghSZ9QnGqk\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Entrevista Mart\u00edn Vila, Director de Infosecurity<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Entrevista del CEO de Cloud Seguro a Mart\u00edn Vila Director del evento de Seguridad de la Informaci\u00f3n Infosecurity, el cual se realiz\u00f3 en Bogot\u00e1 el pasado 4 de Abril de 2019.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/CghSZ9QnGqk\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb18″ bg_color=\u00bb#91c03f\u00bb]Ver el Video<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_divider style=\u00bbshadow_line\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/sR5wKgZAyhc\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Entrevista a Edgar Rojas, director de Tactical Edge<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Entrevista a Edgar Rojas, Director y creador del evento Tactical Edge de Seguridad Inform\u00e1tica, el cual se realiz\u00f3 en su tercera versi\u00f3n el 13 y 14 de marzo de 2019.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/sR5wKgZAyhc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb29″ bg_color=\u00bb#91c03f\u00bb]Ver el Video
\n[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_divider style=\u00bbshadow_line\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/uhGs12l5dWA\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

10 recomendaciones en Seguridad de la Informaci\u00f3n para instituciones educativas<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]En el siguiente video Liliana Toro de Cloud Seguro te muestra 10 recomendaciones para instituciones educativas en Seguridad de la Informaci\u00f3n. Muchos colegios, universidades tienen la obligaci\u00f3n de crear sistemas de gesti\u00f3n en seguridad de la informaci\u00f3n. Cloud Seguro por medio de SeguridadPro, apoya las entidades en crear una cultura de seguridad de la informaci\u00f3n como en realizar unas pruebas t\u00e9cnicas de Ethical Hacking. La seguridad es un requisito de todas las entidades educativas.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/uhGs12l5dWA\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb29″ bg_color=\u00bb#91c03f\u00bb]VER WEBINAR<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_divider style=\u00bbshadow_line\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/ou_yazmK6VY\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Seguridad de la Informaci\u00f3n en la Factura Electr\u00f3nica<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]En el siguiente video se muestra la importancia de la Seguridad de la Informaci\u00f3n en el proceso de Factura Electr\u00f3nica, como los pasos para que los proveedores de factura se puedan certificar en la Norma ISO 27001. Si requieres informaci\u00f3n adicional sobre nos puedes contactar a contacto@cloudseguro.co[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/ou_yazmK6VY\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb29″ bg_color=\u00bb#91c03f\u00bb]VER WEBINAR<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_divider style=\u00bbshadow_line\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/7Z6aXT_lcok\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Sistemas de Gesti\u00f3n<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Catalina Acero de Cloud Seguro muestra la importancia de los Sistemas de Gesti\u00f3n, los cuales se pueden aplicar a la privacidad o a la Seguridad de la Informaci\u00f3n.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/7Z6aXT_lcok\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb29″ bg_color=\u00bb#91c03f\u00bb]VER WEBINAR<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_divider style=\u00bbshadow_line\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/zsU2EzQsl9w\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Retos de la Transformaci\u00f3n Digital<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]En el siguiente video Mario Villamizar de Cloud Seguro, explica los retos de la empresas en los procesos de Transformaci\u00f3n Digital.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/zsU2EzQsl9w\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb29″ bg_color=\u00bb#91c03f\u00bb]VER WEBINAR<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_divider style=\u00bbshadow_line\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/yCiozDrmrRA\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

La importancia de la ISO 27001<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]En el video se muestra la importancia de la norma ISO 27001-2013, enfocada en seguridad de la informaci\u00f3n, y la necesidad de la creaci\u00f3n de un Sistema de Gesti\u00f3n de Seguridad de la informaci\u00f3n por parte de las empresas.[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/yCiozDrmrRA\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb29″ bg_color=\u00bb#91c03f\u00bb]VER WEBINAR<\/p>\n

[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_divider style=\u00bbshadow_line\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_padding_divider size=\u00bb25″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2″ el_position=\u00bbfirst\u00bb][vc_video link=\u00bbhttps:\/\/youtu.be\/8MfG3tXbZJc\u00bb][\/vc_column][vc_column width=\u00bb1\/2″ el_position=\u00bblast\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb24″ margin_top=\u00bb10″ margin_bottom=\u00bb30″ font_family=\u00bbnone\u00bb width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]<\/p>\n

Hackethebox – Redish Espa\u00f1ol<\/h1>\n

[\/mk_fancy_title][vc_column_text disable_pattern=\u00bbfalse\u00bb p_margin_bottom=\u00bb20″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb]Vamos a mostrar una de las maneras en c\u00f3mo se hace pentesting con pivotes. En este video aprender\u00e1s un poco de configuraci\u00f3n de rutas con metasploit, portforwading, escalamiento horizontal y escalamiento vertical. Al final resumen general[\/vc_column_text][mk_button size=\u00bbmedium\u00bb url=\u00bbhttps:\/\/youtu.be\/8MfG3tXbZJc\u00bb align=\u00bbcenter\u00bb margin_top=\u00bb29″ bg_color=\u00bb#91c03f\u00bb]VER WEBINAR<\/p>\n

[\/mk_button][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"

[vc_row][vc_column][mk_padding_divider size=\u00bb60″ width=\u00bb1\/1″ el_position=\u00bbfirst last\u00bb][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb45″ margin_bottom=\u00bb18″ font_family=\u00bbnone\u00bb align=\u00bbcenter\u00bb]Webinar y videos[\/mk_fancy_title][mk_fancy_title tag_name=\u00bbh1″ color=\u00bb#393836″ size=\u00bb26″ margin_bottom=\u00bb18″ font_family=\u00bbnone\u00bb align=\u00bbcenter\u00bb] Aprende con nuestros Webinar y contenido en video de nuestro canal…<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":"","_joinchat":[]},"yoast_head":"\nWebinars - Cloud Seguro<\/title>\n<meta name=\"description\" content=\"Acceda a todos los webinars de Cloud Seguro en directo o a las sesiones pasadas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudseguro.co\/webinar-y-videos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinars - Cloud Seguro\" \/>\n<meta property=\"og:description\" content=\"Acceda a todos los webinars de Cloud Seguro en directo o a las sesiones pasadas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudseguro.co\/webinar-y-videos\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Seguro\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-04T15:11:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudseguro.co\/webinar-y-videos\/\",\"url\":\"https:\/\/www.cloudseguro.co\/webinar-y-videos\/\",\"name\":\"Webinars - Cloud Seguro\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudseguro.co\/#website\"},\"datePublished\":\"2017-05-08T22:11:21+00:00\",\"dateModified\":\"2021-11-04T15:11:24+00:00\",\"description\":\"Acceda a todos los webinars de Cloud Seguro en directo o a las sesiones pasadas.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudseguro.co\/webinar-y-videos\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudseguro.co\/webinar-y-videos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudseguro.co\/webinar-y-videos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudseguro.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar y Videos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudseguro.co\/#website\",\"url\":\"https:\/\/www.cloudseguro.co\/\",\"name\":\"Cloud Seguro\",\"description\":\"Cloud Seguro, empresa l\u00edder en desarrollo de soluciones en la nube, Privacidad y Seguridad de la Informaci\u00f3n.\",\"publisher\":{\"@id\":\"https:\/\/www.cloudseguro.co\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudseguro.co\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudseguro.co\/#organization\",\"name\":\"Cloud Seguro\",\"url\":\"https:\/\/www.cloudseguro.co\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cloudseguro.co\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudseguro.co\/wp-content\/uploads\/2023\/06\/cropped-logo-cloud-seguro.webp\",\"contentUrl\":\"https:\/\/www.cloudseguro.co\/wp-content\/uploads\/2023\/06\/cropped-logo-cloud-seguro.webp\",\"width\":87,\"height\":91,\"caption\":\"Cloud Seguro\"},\"image\":{\"@id\":\"https:\/\/www.cloudseguro.co\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinars - Cloud Seguro","description":"Acceda a todos los webinars de Cloud Seguro en directo o a las sesiones pasadas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudseguro.co\/webinar-y-videos\/","og_locale":"es_ES","og_type":"article","og_title":"Webinars - Cloud Seguro","og_description":"Acceda a todos los webinars de Cloud Seguro en directo o a las sesiones pasadas.","og_url":"https:\/\/www.cloudseguro.co\/webinar-y-videos\/","og_site_name":"Cloud Seguro","article_modified_time":"2021-11-04T15:11:24+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cloudseguro.co\/webinar-y-videos\/","url":"https:\/\/www.cloudseguro.co\/webinar-y-videos\/","name":"Webinars - Cloud Seguro","isPartOf":{"@id":"https:\/\/www.cloudseguro.co\/#website"},"datePublished":"2017-05-08T22:11:21+00:00","dateModified":"2021-11-04T15:11:24+00:00","description":"Acceda a todos los webinars de Cloud Seguro en directo o a las sesiones pasadas.","breadcrumb":{"@id":"https:\/\/www.cloudseguro.co\/webinar-y-videos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudseguro.co\/webinar-y-videos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudseguro.co\/webinar-y-videos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudseguro.co\/"},{"@type":"ListItem","position":2,"name":"Webinar y Videos"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudseguro.co\/#website","url":"https:\/\/www.cloudseguro.co\/","name":"Cloud Seguro","description":"Cloud Seguro, empresa l\u00edder en desarrollo de soluciones en la nube, Privacidad y Seguridad de la Informaci\u00f3n.","publisher":{"@id":"https:\/\/www.cloudseguro.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudseguro.co\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cloudseguro.co\/#organization","name":"Cloud Seguro","url":"https:\/\/www.cloudseguro.co\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cloudseguro.co\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudseguro.co\/wp-content\/uploads\/2023\/06\/cropped-logo-cloud-seguro.webp","contentUrl":"https:\/\/www.cloudseguro.co\/wp-content\/uploads\/2023\/06\/cropped-logo-cloud-seguro.webp","width":87,"height":91,"caption":"Cloud Seguro"},"image":{"@id":"https:\/\/www.cloudseguro.co\/#\/schema\/logo\/image\/"}}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"Cloud Seguro","author_link":"https:\/\/www.cloudseguro.co\/author\/cloud-seguro\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/www.cloudseguro.co\/wp-json\/wp\/v2\/pages\/10940"}],"collection":[{"href":"https:\/\/www.cloudseguro.co\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudseguro.co\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudseguro.co\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudseguro.co\/wp-json\/wp\/v2\/comments?post=10940"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudseguro.co\/wp-json\/wp\/v2\/pages\/10940\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cloudseguro.co\/wp-json\/wp\/v2\/media?parent=10940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}