{"id":707,"date":"2018-10-24T00:31:32","date_gmt":"2018-10-24T05:31:32","guid":{"rendered":"http:\/\/capa8.blog\/?p=707"},"modified":"2018-10-24T00:31:32","modified_gmt":"2018-10-24T05:31:32","slug":"seguridad-de-la-informacion-vs-ciberseguridad","status":"publish","type":"post","link":"https:\/\/www.capa8.com\/blog\/seguridad-de-la-informacion-vs-ciberseguridad\/","title":{"rendered":"Seguridad de la Informaci\u00f3n vs Ciberseguridad"},"content":{"rendered":"<p><a href=\"http:\/\/capa8.com\/\" target=\"_blank\" rel=\"noopener\">M\u00e1s Informaci\u00f3n<\/a><br \/>\n#HablemosDeSeguridad<\/p>\n","protected":false},"excerpt":{"rendered":"<p>M\u00e1s Informaci\u00f3n #HablemosDeSeguridad<\/p>\n","protected":false},"author":3,"featured_media":708,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[75,193,284],"_links":{"self":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/707"}],"collection":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/comments?post=707"}],"version-history":[{"count":0,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/707\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media\/708"}],"wp:attachment":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media?parent=707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/categories?post=707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/tags?post=707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}