{"id":9437,"date":"2020-09-08T09:39:00","date_gmt":"2020-09-08T14:39:00","guid":{"rendered":"https:\/\/colombiainteligente.org\/?p=9437"},"modified":"2022-12-30T09:41:06","modified_gmt":"2022-12-30T14:41:06","slug":"implement-a-vulnerability-disclosure-policy","status":"publish","type":"post","link":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/implement-a-vulnerability-disclosure-policy\/","title":{"rendered":"Implement a Vulnerability Disclosure Policy"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"9437\" class=\"elementor elementor-9437\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79148795 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79148795\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1ece4ebf\" data-id=\"1ece4ebf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a61c7e5 elementor-widget elementor-widget-text-editor\" data-id=\"7a61c7e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>New standards and regulatory change means organisations need to ensure they are prepared to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. This is an important provision because without mechanisms to report, manage and resolve vulnerabilities, the security of consumer IoT products will diminish over time \u2013 and the likelihood of attack or abuse will increase.<\/p><p>The IoTSF Consumer IoT Security Quick Guides build upon the new ETSI EN 303 645 specification on consumer IoT cybersecurity. It is the first international standard of its kind and governments are publishing Codes of Practice (e.g. the UK and Australia) and preparing new legislation (e.g. the UK) based on the standard.<\/p><p>Para leer m\u00e1s ingrese a:<\/p><p><a href=\"https:\/\/www.iotsecurityfoundation.org\/implement-a-vulnerability-disclosure-policy\/\">https:\/\/www.iotsecurityfoundation.org\/implement-a-vulnerability-disclosure-policy\/<\/a><\/p><p><a href=\"https:\/\/www.iotsecurityfoundation.org\/wp-content\/uploads\/2020\/08\/IoTSF-Vulnerability-QG_FINAL.pdf\">https:\/\/www.iotsecurityfoundation.org\/wp-content\/uploads\/2020\/08\/IoTSF-Vulnerability-QG_FINAL.pdf<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div style=\"text-align:center\" class=\"yasr-auto-insert-visitor\"><\/div>","protected":false},"excerpt":{"rendered":"<p>New standards and regulatory change means organisations need to ensure they are prepared to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. This is an important provision because without mechanisms to report, manage and resolve vulnerabilities, the security of consumer IoT products will diminish over time \u2013 and the likelihood of attack or abuse will increase.<\/p>","protected":false},"author":27,"featured_media":9438,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[55,53],"tags":[],"class_list":["post-9437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalizacion","category-tendencias"],"yasr_visitor_votes":{"number_of_votes":0,"sum_votes":0,"stars_attributes":{"read_only":false,"span_bottom":false}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Implement a Vulnerability Disclosure Policy - Colombia Inteligente<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/implement-a-vulnerability-disclosure-policy\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implement a Vulnerability Disclosure Policy - Colombia Inteligente\" \/>\n<meta property=\"og:description\" content=\"New standards and regulatory change means organisations need to ensure they are prepared to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. This is an important provision because without mechanisms to report, manage and resolve vulnerabilities, the security of consumer IoT products will diminish over time \u2013 and the likelihood of attack or abuse will increase.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/implement-a-vulnerability-disclosure-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Colombia Inteligente\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-08T14:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-30T14:41:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/02-12-manage_vulnerability.png\" \/>\n\t<meta property=\"og:image:width\" content=\"282\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Luisa Buitrago\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:site\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luisa Buitrago\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/\"},\"author\":{\"name\":\"Luisa Buitrago\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/7a8c7be348df0b891a16dc2fe342977d\"},\"headline\":\"Implement a Vulnerability Disclosure Policy\",\"datePublished\":\"2020-09-08T14:39:00+00:00\",\"dateModified\":\"2022-12-30T14:41:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/\"},\"wordCount\":136,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/02-12-manage_vulnerability.png\",\"articleSection\":[\"Digitalizaci\u00f3n\",\"Tendencias\"],\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/\",\"name\":\"Implement a Vulnerability Disclosure Policy - Colombia Inteligente\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/02-12-manage_vulnerability.png\",\"datePublished\":\"2020-09-08T14:39:00+00:00\",\"dateModified\":\"2022-12-30T14:41:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/02-12-manage_vulnerability.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/02-12-manage_vulnerability.png\",\"width\":282,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/implement-a-vulnerability-disclosure-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/colombiainteligente.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implement a Vulnerability Disclosure Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"name\":\"Colombia Inteligente\",\"description\":\"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano\",\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/colombiainteligente.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\",\"name\":\"Colombia Inteligente\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"width\":588,\"height\":274,\"caption\":\"Colombia Inteligente\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/colombiaintelig\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/colombiainteligente\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/7a8c7be348df0b891a16dc2fe342977d\",\"name\":\"Luisa Buitrago\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"caption\":\"Luisa Buitrago\"},\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/es_co\\\/author\\\/luisa-buitragocolombiainteligente-org\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implement a Vulnerability Disclosure Policy - Colombia Inteligente","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/implement-a-vulnerability-disclosure-policy\/","og_locale":"es_ES","og_type":"article","og_title":"Implement a Vulnerability Disclosure Policy - Colombia Inteligente","og_description":"New standards and regulatory change means organisations need to ensure they are prepared to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. This is an important provision because without mechanisms to report, manage and resolve vulnerabilities, the security of consumer IoT products will diminish over time \u2013 and the likelihood of attack or abuse will increase.","og_url":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/implement-a-vulnerability-disclosure-policy\/","og_site_name":"Colombia Inteligente","article_published_time":"2020-09-08T14:39:00+00:00","article_modified_time":"2022-12-30T14:41:06+00:00","og_image":[{"width":282,"height":400,"url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/02-12-manage_vulnerability.png","type":"image\/png"}],"author":"Luisa Buitrago","twitter_card":"summary_large_image","twitter_creator":"@colombiaintelig","twitter_site":"@colombiaintelig","twitter_misc":{"Escrito por":"Luisa Buitrago","Tiempo estimado de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/#article","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/"},"author":{"name":"Luisa Buitrago","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/7a8c7be348df0b891a16dc2fe342977d"},"headline":"Implement a Vulnerability Disclosure Policy","datePublished":"2020-09-08T14:39:00+00:00","dateModified":"2022-12-30T14:41:06+00:00","mainEntityOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/"},"wordCount":136,"commentCount":0,"publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/02-12-manage_vulnerability.png","articleSection":["Digitalizaci\u00f3n","Tendencias"],"inLanguage":"es-CO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/","url":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/","name":"Implement a Vulnerability Disclosure Policy - Colombia Inteligente","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/#primaryimage"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/02-12-manage_vulnerability.png","datePublished":"2020-09-08T14:39:00+00:00","dateModified":"2022-12-30T14:41:06+00:00","breadcrumb":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/"]}]},{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/#primaryimage","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/02-12-manage_vulnerability.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/02-12-manage_vulnerability.png","width":282,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/colombiainteligente.org\/tendencias\/implement-a-vulnerability-disclosure-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/colombiainteligente.org\/"},{"@type":"ListItem","position":2,"name":"Implement a Vulnerability Disclosure Policy"}]},{"@type":"WebSite","@id":"https:\/\/colombiainteligente.org\/#website","url":"https:\/\/colombiainteligente.org\/","name":"Colombia Inteligente","description":"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano","publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/colombiainteligente.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/colombiainteligente.org\/#organization","name":"Colombia Inteligente","url":"https:\/\/colombiainteligente.org\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","width":588,"height":274,"caption":"Colombia Inteligente"},"image":{"@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/colombiaintelig","https:\/\/www.linkedin.com\/company\/colombiainteligente\/"]},{"@type":"Person","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/7a8c7be348df0b891a16dc2fe342977d","name":"Luisa Buitrago","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","caption":"Luisa Buitrago"},"url":"https:\/\/colombiainteligente.org\/es_co\/author\/luisa-buitragocolombiainteligente-org\/"}]}},"_links":{"self":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/comments?post=9437"}],"version-history":[{"count":5,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9437\/revisions"}],"predecessor-version":[{"id":9447,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9437\/revisions\/9447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media\/9438"}],"wp:attachment":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media?parent=9437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/categories?post=9437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/tags?post=9437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}