{"version":"1.0","provider_name":"OSTEC | Seguran\u00e7a digital de resultados","provider_url":"https:\/\/ostec.blog\/es\/","author_name":"Alejandra Villanueva","author_url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/","title":"Security by Design seg\u00fan OWASP - OSTEC | Seguran\u00e7a digital de resultados","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VFD6xDeM9C\"><a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/security-by-design-segun-owasp\/\">Security by Design seg\u00fan OWASP<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/security-by-design-segun-owasp\/embed\/#?secret=VFD6xDeM9C\" width=\"600\" height=\"338\" title=\"\u00abSecurity by Design seg\u00fan OWASP\u00bb \u2014 OSTEC | Seguran\u00e7a digital de resultados\" data-secret=\"VFD6xDeM9C\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/08\/security-by-design-OWASP.jpg","thumbnail_width":928,"thumbnail_height":534,"description":"Existe una comunidad virtual que crea herramientas, documentaci\u00f3n, art\u00edculos y tecnolog\u00edas gratuitos para ayudar a las personas a proteger sus sitios web, aplicaciones y recursos de red. Se llama OWASP, un acr\u00f3nimo de Open Web Application Security Project, que se traduce como Open Web Application Security Project. Esta entidad trata directamente el concepto de security [&hellip;]"}