{"id":250,"date":"2008-12-19T14:13:39","date_gmt":"2008-12-19T12:13:39","guid":{"rendered":"https:\/\/blogs.ua.es\/jgaliana\/?p=250"},"modified":"2008-12-19T14:33:00","modified_gmt":"2008-12-19T12:33:00","slug":"predicciones-de-seguridad-informatica-para-2009","status":"publish","type":"post","link":"https:\/\/blogs.ua.es\/jgaliana\/2008\/12\/19\/predicciones-de-seguridad-informatica-para-2009\/","title":{"rendered":"Predicciones de seguridad inform\u00e1tica para 2009"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.ua.es\/jgaliana\/files\/2008\/12\/network-security.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.ua.es\/jgaliana\/files\/2008\/12\/network-security-150x150.png\" alt=\"\" width=\"150\" height=\"150\" class=\"alignleft size-thumbnail wp-image-252\" \/><\/a>Os dejo una nota corta, le\u00edda en el blog de <a href=\"http:\/\/caballe.cat\/wp\/prediccions-sobre-seguretat-informatica-per-lany-2009\/\">Xavier Caball\u00e9<\/a> sobre las predicciones de seguridad inform\u00e1tica para el a\u00f1o 2009 que lo tenemos ah\u00ed mismo:<\/p>\n<p><em><a href=\"http:\/\/www.crn.com\/security\/212201985\">10 Security Predictions for 2009<\/a> <\/em>(Channel Web)<br \/>\n<em><a href=\"http:\/\/www.sans.edu\/resources\/securitylab\/2009_predictions.php\">2009 Security Predicitions<\/a> <\/em>(SANS Institute)<br \/>\n<em><a href=\"http:\/\/www.cio.com\/article\/462333\/Security_Predictions_Experts_Look_Ahead_to_and_Beyond\">Security Predicitions: Experts Look Ahead to 2009 and Beyond<\/a> <\/em>(CIO.com)<br \/>\n<em><a href=\"http:\/\/www.csoonline.com\/article\/463067\/Rich_Mogull_Infosec_Trends_for_\">Rich Mogull: 7 Infosec Trends for 2009<\/a> <\/em>(CSO Online)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os dejo una nota corta, le\u00edda en el blog de Xavier Caball\u00e9 sobre las predicciones de seguridad inform\u00e1tica para el a\u00f1o 2009 que lo tenemos ah\u00ed mismo: 10 Security Predictions for 2009 (Channel Web) 2009 Security Predicitions (SANS Institute) Security Predicitions: Experts Look Ahead to 2009 and Beyond (CIO.com) Rich Mogull: 7 Infosec Trends for [&hellip;]<\/p>\n","protected":false},"author":139,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[488],"tags":[],"class_list":["post-250","post","type-post","status-publish","format-standard","hentry","category-seguridad"],"_links":{"self":[{"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/posts\/250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":8,"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/posts\/250\/revisions"}],"predecessor-version":[{"id":260,"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/posts\/250\/revisions\/260"}],"wp:attachment":[{"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/media?parent=250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/categories?post=250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ua.es\/jgaliana\/wp-json\/wp\/v2\/tags?post=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}