{"version":"1.0","provider_name":"OSTEC | Seguran\u00e7a digital de resultados","provider_url":"https:\/\/ostec.blog\/es\/","author_name":"Thais Souza","author_url":"https:\/\/ostec.blog\/es\/author\/thais-souza\/","title":"Firewall UTM open source - OSTEC | Seguran\u00e7a digital de resultados","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DmaSWq2mgW\"><a href=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/firewall-utm-open-source\/\">Firewall UTM open source<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/firewall-utm-open-source\/embed\/#?secret=DmaSWq2mgW\" width=\"600\" height=\"338\" title=\"\u00abFirewall UTM open source\u00bb \u2014 OSTEC | Seguran\u00e7a digital de resultados\" data-secret=\"DmaSWq2mgW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/03\/spyware-1.jpg","thumbnail_width":928,"thumbnail_height":534,"description":"La seguridad de la informaci\u00f3n ha ganado terreno en las pautas de empresas de todo el mundo. La madurez frente al tema dicta las inversiones en seguridad de la informaci\u00f3n en las organizaciones. Algunas empresas invierten pesado, otras invierten de forma t\u00edmida, pero es visible el aumento de la preocupaci\u00f3n de las empresas en proteger, [&hellip;]"}