{"version":"1.0","provider_name":"DKS, tu centro de estudios especializado en internet","provider_url":"https:\/\/dks.digital\/mx\/","author_name":"Julio Alberto Delgado","author_url":"https:\/\/dks.digital\/mx\/blog\/author\/julioalbertoadmin\/","title":"\u00bfQu\u00e9 es Cyber Threat Intelligence y por qu\u00e9 deber\u00eda formarme en ello? - DKS, tu centro de estudios especializado en internet","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ZfxBShaz7A\"><a href=\"https:\/\/dks.digital\/mx\/blog\/ciberseguridad\/que-es-cyber-threat-intelligence\/\">\u00bfQu\u00e9 es Cyber Threat Intelligence y por qu\u00e9 deber\u00eda formarme en ello?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dks.digital\/mx\/blog\/ciberseguridad\/que-es-cyber-threat-intelligence\/embed\/#?secret=ZfxBShaz7A\" width=\"600\" height=\"338\" title=\"&#8220;\u00bfQu\u00e9 es Cyber Threat Intelligence y por qu\u00e9 deber\u00eda formarme en ello?&#8221; &#8212; DKS, tu centro de estudios especializado en internet\" data-secret=\"ZfxBShaz7A\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/dks.digital\/wp-content\/uploads\/2023\/05\/it-professional-working-notebook-with-ai-machine-learning-algorithms-scaled.jpg","thumbnail_width":600,"thumbnail_height":338,"description":"\u00bfHas o\u00eddo hablar alguna vez de Cyber Threat Intelligence? Este t\u00e9rmino surgido en Europa engloba una serie de acciones que pretenden combatir las amenazas que se pueden producir en materia de ciberseguridad. Los programas de CTI son cada vez m\u00e1s habituales en las empresas, pero muy necesarios, por lo que formarte en esta disciplina puede [&hellip;]"}