{"version":"1.0","provider_name":"OSTEC | Seguran\u00e7a digital de resultados","provider_url":"https:\/\/ostec.blog\/es\/","author_name":"Alejandra Villanueva","author_url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/","title":"\u00bfQu\u00e9 es la Gesti\u00f3n de Vulnerabilidades? - OSTEC | Seguran\u00e7a digital de resultados","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MC9XFG3Nma\"><a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/que-es-la-gestion-de-vulnerabilidades\/\">\u00bfQu\u00e9 es la Gesti\u00f3n de Vulnerabilidades?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/que-es-la-gestion-de-vulnerabilidades\/embed\/#?secret=MC9XFG3Nma\" width=\"600\" height=\"338\" title=\"\u00ab\u00bfQu\u00e9 es la Gesti\u00f3n de Vulnerabilidades?\u00bb \u2014 OSTEC | Seguran\u00e7a digital de resultados\" data-secret=\"MC9XFG3Nma\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ostec.blog\/wp-content\/uploads\/2023\/07\/gv-gestao.jpg","thumbnail_width":928,"thumbnail_height":534,"description":"En un mundo cada vez m\u00e1s digital e interconectado, las organizaciones enfrentan desaf\u00edos constantes en materia de seguridad de la informaci\u00f3n. Las vulnerabilidades de seguridad pueden surgir de diversos or\u00edgenes, como fallas de software, configuraciones incorrectas, falta de actualizaciones, errores humanos y ataques digitales. La Gesti\u00f3n de Vulnerabilidades es una pr\u00e1ctica fundamental para garantizar la [&hellip;]"}