{"id":3693,"date":"2024-12-05T12:18:17","date_gmt":"2024-12-05T12:18:17","guid":{"rendered":"https:\/\/egblanco.com\/?page_id=3693"},"modified":"2024-12-05T13:09:54","modified_gmt":"2024-12-05T13:09:54","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/egblanco.com\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3693\" class=\"elementor elementor-3693\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf5b296 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf5b296\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d07208\" data-id=\"8d07208\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd49665 elementor-widget elementor-widget-text-editor\" data-id=\"cd49665\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">Software, computer, and network protection is a set of measures taken to counter cyberattacks and breaches, along with the associated risks. It emerged at the beginning of the Cold War and evolved with the rise of the internet and computer systems, becoming a key tool for international security and warfare.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Software, computer, and network protection is a set of measures taken to counter cyberattacks and breaches, along with the associated risks. It emerged at the beginning of the Cold War and evolved with the rise of the internet and computer systems, becoming a key tool for international security and warfare.<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3693","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/egblanco.com\/en\/wp-json\/wp\/v2\/pages\/3693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/egblanco.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/egblanco.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/egblanco.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/egblanco.com\/en\/wp-json\/wp\/v2\/comments?post=3693"}],"version-history":[{"count":7,"href":"https:\/\/egblanco.com\/en\/wp-json\/wp\/v2\/pages\/3693\/revisions"}],"predecessor-version":[{"id":3768,"href":"https:\/\/egblanco.com\/en\/wp-json\/wp\/v2\/pages\/3693\/revisions\/3768"}],"wp:attachment":[{"href":"https:\/\/egblanco.com\/en\/wp-json\/wp\/v2\/media?parent=3693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}