{"id":449,"date":"2023-10-25T16:38:29","date_gmt":"2023-10-25T21:38:29","guid":{"rendered":"https:\/\/bgsolutions.tech\/?page_id=449"},"modified":"2023-10-25T17:19:35","modified_gmt":"2023-10-25T22:19:35","slug":"articulos-de-blog","status":"publish","type":"page","link":"https:\/\/bgsolutions.tech\/en\/articulos-de-blog\/","title":{"rendered":"Blog Articles"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"449\" class=\"elementor elementor-449\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d64c226 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"d64c226\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec43175\" data-id=\"ec43175\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4885485 elementor-widget elementor-widget-heading\" data-id=\"4885485\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Blog Articles<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63256eb elementor-widget elementor-widget-heading\" data-id=\"63256eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our official blog for news, cybersecurity tips and more!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9d36f6d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9d36f6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ed68b5f\" data-id=\"ed68b5f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67f31b9 elementor-posts--align-left elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"67f31b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1034 post type-post status-publish format-standard has-post-thumbnail hentry category-blueteam tag-ciberseguridad\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/bgsolutions.tech\/en\/2024\/05\/20\/seguridad-bajo-amenaza-tengo-lo-ultimo-en-tecnologia-por-que-fui-hackeado\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB.jpeg\" class=\"attachment-large size-large wp-image-447\" alt=\"\" srcset=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB.jpeg 1000w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-300x200.jpeg 300w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-768x512.jpeg 768w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-18x12.jpeg 18w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-500x334.jpeg 500w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-800x534.jpeg 800w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/bgsolutions.tech\/en\/2024\/05\/20\/seguridad-bajo-amenaza-tengo-lo-ultimo-en-tecnologia-por-que-fui-hackeado\/\" >\n\t\t\t\tSeguridad Bajo Amenaza: Tengo lo \u00faltimo en tecnolog\u00eda, \u00bfPor qu\u00e9 fui hackeado?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/bgsolutions.tech\/en\/2024\/05\/20\/seguridad-bajo-amenaza-tengo-lo-ultimo-en-tecnologia-por-que-fui-hackeado\/\" aria-label=\"Read more about Seguridad Bajo Amenaza: Tengo lo \u00faltimo en tecnolog\u00eda, \u00bfPor qu\u00e9 fui hackeado?\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMay 20, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-845 post type-post status-publish format-standard has-post-thumbnail hentry category-blueteam\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/10\/fortaleciendo-su-ciberseguridad-con-los-controles-de-seguridad-cis-v8\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB.jpeg\" class=\"attachment-large size-large wp-image-447\" alt=\"\" srcset=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB.jpeg 1000w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-300x200.jpeg 300w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-768x512.jpeg 768w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-18x12.jpeg 18w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-500x334.jpeg 500w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/wepik-export-20231025032725luXB-800x534.jpeg 800w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/10\/fortaleciendo-su-ciberseguridad-con-los-controles-de-seguridad-cis-v8\/\" >\n\t\t\t\tImproving your Cybersecurity with CIS v8 Security Controls\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/10\/fortaleciendo-su-ciberseguridad-con-los-controles-de-seguridad-cis-v8\/\" aria-label=\"Read more about Fortaleciendo su Ciberseguridad con los Controles de Seguridad CIS v8\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 10, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-839 post type-post status-publish format-standard has-post-thumbnail hentry category-blueteam tag-ciberseguridad tag-cloud-risk-top10 tag-cloud-security tag-cloudtop10-risk tag-seguridad-en-la-nube\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/08\/top-10-de-riesgos-de-seguridad-en-la-nube-2023\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CloudAttack.png\" class=\"attachment-large size-large wp-image-840\" alt=\"\" srcset=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CloudAttack.png 1024w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CloudAttack-300x300.png 300w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CloudAttack-150x150.png 150w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CloudAttack-768x768.png 768w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CloudAttack-12x12.png 12w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CloudAttack-500x500.png 500w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CloudAttack-800x800.png 800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/08\/top-10-de-riesgos-de-seguridad-en-la-nube-2023\/\" >\n\t\t\t\tTop 10 Security Risks in the Cloud 2023\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/08\/top-10-de-riesgos-de-seguridad-en-la-nube-2023\/\" aria-label=\"Read more about Top 10 de Riesgos de Seguridad en la Nube 2023\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 8, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-836 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/05\/fortaleciendo-la-resiliencia-organizacional-con-el-nist-cybersecurity-framework\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"1024\" height=\"987\" src=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-1024x987.png\" class=\"attachment-large size-large wp-image-837\" alt=\"\" srcset=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-1024x987.png 1024w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-300x289.png 300w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-768x740.png 768w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-1536x1481.png 1536w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-2048x1974.png 2048w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-12x12.png 12w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-500x482.png 500w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-800x771.png 800w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-1280x1234.png 1280w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2024\/01\/CSF-wheel-revamp-final-white-1920x1851.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/05\/fortaleciendo-la-resiliencia-organizacional-con-el-nist-cybersecurity-framework\/\" >\n\t\t\t\tImproving Organizational Resilience with the NIST Cybersecurity Framework\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/bgsolutions.tech\/en\/2024\/01\/05\/fortaleciendo-la-resiliencia-organizacional-con-el-nist-cybersecurity-framework\/\" aria-label=\"Read more about Fortaleciendo la Resiliencia Organizacional con el NIST Cybersecurity Framework\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 5, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-816 post type-post status-publish format-standard has-post-thumbnail hentry category-blueteam tag-auditoria tag-iso27001 tag-nist tag-pentest tag-vulnerability-assessment\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/bgsolutions.tech\/en\/2023\/12\/07\/auditoria-de-cumplimiento-vs-vulnerability-assessment-vs-pentest-vs-auditorias-basadas-en-marcos-de-referencia-cual-necesito\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-1024x683.jpg\" class=\"attachment-large size-large wp-image-817\" alt=\"\" srcset=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-1024x683.jpg 1024w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-300x200.jpg 300w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-768x512.jpg 768w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-1536x1024.jpg 1536w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-2048x1365.jpg 2048w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-18x12.jpg 18w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-500x333.jpg 500w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-800x533.jpg 800w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-1280x853.jpg 1280w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/12\/concepto-seguridad-cibernetica-inicio-sesion-seguridad-informacion-identificacion-usuario-cifrado-acceso-seguro-internet-seguridad-cibernetica-acceso-seguro-informacion-personal-usuarios-1920x1280.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/bgsolutions.tech\/en\/2023\/12\/07\/auditoria-de-cumplimiento-vs-vulnerability-assessment-vs-pentest-vs-auditorias-basadas-en-marcos-de-referencia-cual-necesito\/\" >\n\t\t\t\tBenchmarking and Strategic Choice: Compliance Audit, Vulnerability Assessment, Pentest and Benchmark Audits - Which is Right for Your Organization?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/bgsolutions.tech\/en\/2023\/12\/07\/auditoria-de-cumplimiento-vs-vulnerability-assessment-vs-pentest-vs-auditorias-basadas-en-marcos-de-referencia-cual-necesito\/\" aria-label=\"Read more about Comparativa y Elecci\u00f3n Estrat\u00e9gica: Auditor\u00eda de Cumplimiento, Evaluaci\u00f3n de Vulnerabilidades, Pentest y Auditor\u00edas en Base a Marcos de Referencia &#8211; \u00bfCu\u00e1l es la Adecuada para su Organizaci\u00f3n?\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 7, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-444 post type-post status-publish format-standard has-post-thumbnail hentry category-blueteam\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/bgsolutions.tech\/en\/2023\/10\/24\/servicio-gestionado-de-ciberseguridad-en-el-corazon-de-la-transformacion-digital\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-1024x683.jpg\" class=\"attachment-large size-large wp-image-446\" alt=\"\" srcset=\"https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-1024x683.jpg 1024w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-300x200.jpg 300w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-768x512.jpg 768w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-1536x1024.jpg 1536w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-2048x1366.jpg 2048w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-18x12.jpg 18w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-500x333.jpg 500w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-800x534.jpg 800w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-1280x854.jpg 1280w, https:\/\/bgsolutions.tech\/wp-content\/uploads\/2023\/10\/concepto-rpa-pantalla-tactil-mano-borrosa-1920x1281.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/bgsolutions.tech\/en\/2023\/10\/24\/servicio-gestionado-de-ciberseguridad-en-el-corazon-de-la-transformacion-digital\/\" >\n\t\t\t\tCybersecurity Managed Service at the Heart of Digital Transformation\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/bgsolutions.tech\/en\/2023\/10\/24\/servicio-gestionado-de-ciberseguridad-en-el-corazon-de-la-transformacion-digital\/\" aria-label=\"Read more about Servicio Gestionado de Ciberseguridad en el Coraz\u00f3n de la Transformaci\u00f3n Digital\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tOctober 24, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Art\u00edculos de Blog \u00a1Nuestro Blog oficial de noticias, recomendaciones sobre ciberseguridad y m\u00e1s!<\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_mo_disable_npp":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"class_list":["post-449","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/pages\/449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/comments?post=449"}],"version-history":[{"count":7,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/pages\/449\/revisions"}],"predecessor-version":[{"id":460,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/pages\/449\/revisions\/460"}],"wp:attachment":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/media?parent=449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}