{"version":"1.0","provider_name":"Colombia Inteligente","provider_url":"https:\/\/colombiainteligente.org\/es_co","title":"Cybersecurity Throughout Your Transformation - Colombia Inteligente","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"dVgvzxrn3c\"><a href=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/cybersecurity-throughout-your-transformation\/\">Cybersecurity Throughout Your Transformation<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/cybersecurity-throughout-your-transformation\/embed\/#?secret=dVgvzxrn3c\" width=\"600\" height=\"338\" title=\"\u201cCybersecurity Throughout Your Transformation\u201d \u2014 Colombia Inteligente\" data-secret=\"dVgvzxrn3c\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\" data-no-translation-title=\"\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>","thumbnail_url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/01\/115464BC-AD29-4CFD-B7EF-722E76C3303B.jpeg","thumbnail_width":300,"thumbnail_height":386,"description":"\u00bfPor qu\u00e9 seguimos hablando de las vulnerabilidades de la ciberseguridad en la fabricaci\u00f3n? \u00bfPor qu\u00e9 siguen existiendo oportunidades para mejorar las formas de defender nuestros activos industriales? Porque las amenazas siguen evolucionando, los malos actores son m\u00e1s inteligentes cada d\u00eda y el da\u00f1o potencial para su empresa aumenta con cada paso de su transformaci\u00f3n digital. Este informe tecnol\u00f3gico presenta nuevas orientaciones de expertos en primera l\u00ednea de la batalla de la ciberseguridad."}