{"version":"1.0","provider_name":"OSTEC | Seguran\u00e7a digital de resultados","provider_url":"https:\/\/ostec.blog\/es\/","author_name":"Alejandra Villanueva","author_url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/","title":"Firewall UTM open source - OSTEC | Seguran\u00e7a digital de resultados","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"yZY78IgcuT\"><a href=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/firewall-utm-open-source-2\/\">Firewall UTM open source<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/firewall-utm-open-source-2\/embed\/#?secret=yZY78IgcuT\" width=\"600\" height=\"338\" title=\"\u00abFirewall UTM open source\u00bb \u2014 OSTEC | Seguran\u00e7a digital de resultados\" data-secret=\"yZY78IgcuT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"La seguridad de la informaci\u00f3n ha ido tomando espacio en las pautas de empresas de todo el mundo. La madurez ante el tema dicta las inversiones en seguridad de la informaci\u00f3n de las organizaciones. Algunas empresas invierten con fuerza, otras invierten de forma t\u00edmida, con todo se ve el aumento de la preocupaci\u00f3n de las [&hellip;]"}