{"id":1103,"date":"2025-03-12T11:03:25","date_gmt":"2025-03-12T10:03:25","guid":{"rendered":"https:\/\/blog.cyberguardian.tech\/?p=1103"},"modified":"2026-02-19T09:40:31","modified_gmt":"2026-02-19T09:40:31","slug":"predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025","status":"publish","type":"post","link":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/","title":{"rendered":"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025"},"content":{"rendered":"\n<p class=\"has-text-align-justify\">Os animamos a leer este <a href=\"https:\/\/www.europapress.es\/comunicados\/empresas-00908\/noticia-comunicado-predicciones-cyber-guardian-amenazas-ciberseguridad-2025-20250227130345.html\" target=\"_blank\" rel=\"noreferrer noopener\">art\u00edculo<\/a> publicado el pasado mes de Febrero donde explicamos nuestras predicciones sobre <strong>qu\u00e9 amenazas de ciberseguridad esperamos en 2025, c\u00f3mo impactar\u00e1n a las empresas medianas y peque\u00f1as, y qu\u00e9 medidas pueden tomar para estar preparadas<\/strong> ante:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ataques de <a href=\"https:\/\/www.cyberguardian.tech\/blog\/ransomware-sa-la-industria-rentable-del-cibercrimen\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware <\/a>m\u00e1s sofisticados.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.cyberguardian.tech\/blog\/el-fraude-del-ceo-impulsado-por-inteligencia-artificial\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing dirigido<\/a> y ataques de Ingenier\u00eda Social m\u00e1s sofisticados<\/li>\n\n\n\n<li>Ataques a la <a href=\"https:\/\/www.cyberguardian.tech\/blog\/fraude-en-facturas-como-la-inteligencia-artificial-desafia-la-ciberseguridad\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cadena de suministro<\/a><\/li>\n\n\n\n<li>La automatizaci\u00f3n con IA como arma de doble filo<\/li>\n<\/ul>\n\n\n\n<p>Accede al art\u00edculo completo en <a href=\"https:\/\/www.europapress.es\/comunicados\/empresas-00908\/noticia-comunicado-predicciones-cyber-guardian-amenazas-ciberseguridad-2025-20250227130345.html\" target=\"_blank\" rel=\"noreferrer noopener\">Europa Press<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os animamos a leer este art\u00edculo publicado el pasado mes de Febrero donde explicamos nuestras predicciones sobre qu\u00e9 amenazas de ciberseguridad esperamos en 2025, c\u00f3mo impactar\u00e1n a las empresas medianas y peque\u00f1as, y qu\u00e9 medidas pueden tomar para estar preparadas ante: Accede al art\u00edculo completo en Europa Press.<\/p>\n","protected":false},"author":6,"featured_media":1120,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10,12],"tags":[],"class_list":["post-1103","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos-cyber-guardian","category-noticias-cyber"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Predicciones sobre amenazas de ciberseguridad para 2025<\/title>\n<meta name=\"description\" content=\"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Predicciones sobre amenazas de ciberseguridad para 2025\" \/>\n<meta property=\"og:description\" content=\"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guardian - Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-12T10:03:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-19T09:40:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2025\/03\/Predicciones-Ciberseguridad-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1118\" \/>\n\t<meta property=\"og:image:height\" content=\"743\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cyber Guardian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber Guardian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/\"},\"author\":{\"name\":\"Cyber Guardian\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#\\\/schema\\\/person\\\/a3ed9f985851939bf7cef30f1017d93c\"},\"headline\":\"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025\",\"datePublished\":\"2025-03-12T10:03:25+00:00\",\"dateModified\":\"2026-02-19T09:40:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/\"},\"wordCount\":94,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Predicciones-Ciberseguridad-2025.png\",\"articleSection\":[\"Art\u00edculos Cyber Guardian\",\"Noticias Cyber\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/\",\"url\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/\",\"name\":\"Predicciones sobre amenazas de ciberseguridad para 2025\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Predicciones-Ciberseguridad-2025.png\",\"datePublished\":\"2025-03-12T10:03:25+00:00\",\"dateModified\":\"2026-02-19T09:40:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#\\\/schema\\\/person\\\/a3ed9f985851939bf7cef30f1017d93c\"},\"description\":\"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Predicciones-Ciberseguridad-2025.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Predicciones-Ciberseguridad-2025.png\",\"width\":1118,\"height\":743},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/\",\"name\":\"Cyber Guardian - Blog\",\"description\":\"Blog sobre ciberseguridad para peque\u00f1as y medianas empresas f\u00e1cil de entender tambi\u00e9n para usuarios no t\u00e9cnicos.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#\\\/schema\\\/person\\\/a3ed9f985851939bf7cef30f1017d93c\",\"name\":\"Cyber Guardian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g\",\"caption\":\"Cyber Guardian\"},\"sameAs\":[\"https:\\\/\\\/cyberguardian.tech\"],\"url\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/author\\\/cyberguardian\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Predicciones sobre amenazas de ciberseguridad para 2025","description":"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/","og_locale":"es_ES","og_type":"article","og_title":"Predicciones sobre amenazas de ciberseguridad para 2025","og_description":"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025","og_url":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/","og_site_name":"Cyber Guardian - Blog","article_published_time":"2025-03-12T10:03:25+00:00","article_modified_time":"2026-02-19T09:40:31+00:00","og_image":[{"width":1118,"height":743,"url":"https:\/\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2025\/03\/Predicciones-Ciberseguridad-2025.png","type":"image\/png"}],"author":"Cyber Guardian","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Cyber Guardian","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/#article","isPartOf":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/"},"author":{"name":"Cyber Guardian","@id":"https:\/\/www.cyberguardian.tech\/blog\/#\/schema\/person\/a3ed9f985851939bf7cef30f1017d93c"},"headline":"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025","datePublished":"2025-03-12T10:03:25+00:00","dateModified":"2026-02-19T09:40:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/"},"wordCount":94,"image":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2025\/03\/Predicciones-Ciberseguridad-2025.png","articleSection":["Art\u00edculos Cyber Guardian","Noticias Cyber"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/","url":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/","name":"Predicciones sobre amenazas de ciberseguridad para 2025","isPartOf":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2025\/03\/Predicciones-Ciberseguridad-2025.png","datePublished":"2025-03-12T10:03:25+00:00","dateModified":"2026-02-19T09:40:31+00:00","author":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/#\/schema\/person\/a3ed9f985851939bf7cef30f1017d93c"},"description":"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025","breadcrumb":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/#primaryimage","url":"https:\/\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2025\/03\/Predicciones-Ciberseguridad-2025.png","contentUrl":"https:\/\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2025\/03\/Predicciones-Ciberseguridad-2025.png","width":1118,"height":743},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguardian.tech\/blog\/predicciones-de-cyber-guardian-sobre-amenazas-de-ciberseguridad-para-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.cyberguardian.tech\/blog\/"},{"@type":"ListItem","position":2,"name":"Predicciones de Cyber Guardian sobre amenazas de ciberseguridad para 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguardian.tech\/blog\/#website","url":"https:\/\/www.cyberguardian.tech\/blog\/","name":"Cyber Guardian - Blog","description":"Blog sobre ciberseguridad para peque\u00f1as y medianas empresas f\u00e1cil de entender tambi\u00e9n para usuarios no t\u00e9cnicos.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguardian.tech\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.cyberguardian.tech\/blog\/#\/schema\/person\/a3ed9f985851939bf7cef30f1017d93c","name":"Cyber Guardian","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g","caption":"Cyber Guardian"},"sameAs":["https:\/\/cyberguardian.tech"],"url":"https:\/\/www.cyberguardian.tech\/blog\/author\/cyberguardian\/"}]}},"jetpack_featured_media_url":"https:\/\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2025\/03\/Predicciones-Ciberseguridad-2025.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":113,"url":"https:\/\/www.cyberguardian.tech\/blog\/ciberseguridad-como-proteger-el-negocio-frente-a-las-crecientes-amenazas\/","url_meta":{"origin":1103,"position":0},"title":"Ciberseguridad: c\u00f3mo proteger el negocio frente a las crecientes amenazas","author":"Cyber Guardian","date":"24 de mayo de 2023","format":false,"excerpt":"Os dejamos este art\u00edculo interesante en El Economista para aquellas PYMEs que tengan inquietudes acerca de la Ciberseguridad y donde adem\u00e1s se menciona a Cyber Guardian.","rel":"","context":"En \u00abNoticias Cyber\u00bb","block_context":{"text":"Noticias Cyber","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/noticias-cyber\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":267,"url":"https:\/\/www.cyberguardian.tech\/blog\/cyber-guardian-en-el-i-congreso-de-ciberseguridad-para-pymes\/","url_meta":{"origin":1103,"position":1},"title":"Cyber Guardian en el I Congreso de Ciberseguridad para pymes","author":"Cyber Guardian","date":"16 de diciembre de 2022","format":false,"excerpt":"Esta semana Cyber Guardian estuvo en el I Congreso de Ciberseguridad para PYMES en Madrid, organizado conjuntamente por ISMS Forum\u00a0y\u00a0Cluster CyberMadrid. Nuestro responsable global Jose Antonio Castro habl\u00f3 del contexto actual de las amenazas de ciberseguridad donde las PYMES son las m\u00e1s vulnerables. \"Las peque\u00f1as y medianas empresas viven tres\u2026","rel":"","context":"En \u00abEventos\u00bb","block_context":{"text":"Eventos","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/eventos\/"},"img":{"alt_text":"Congreso Ciberseguridad Pymes","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/336c12f8fe3e08d6.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/336c12f8fe3e08d6.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/336c12f8fe3e08d6.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/336c12f8fe3e08d6.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":139,"url":"https:\/\/www.cyberguardian.tech\/blog\/encuentro-con-aseguradoras-y-principales-actores-del-mundo-del-ciberseguro\/","url_meta":{"origin":1103,"position":2},"title":"Encuentro con Aseguradoras y actores del mundo del ciberseguro","author":"Cyber Guardian","date":"16 de junio de 2023","format":false,"excerpt":"Esta semana, los d\u00edas 13 y 14 de junio tuvimos la oportunidad de patrocinar y participar en el Espacio tiSec, de la Revista SIC, y compartir experiencias con grandes aseguradoras y los principales actores en el mundo del ciberseguro. Nuestro Director General, Jos\u00e9 Antonio Castro realiz\u00f3 una ponencia en la\u2026","rel":"","context":"En \u00abEventos\u00bb","block_context":{"text":"Eventos","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/eventos\/"},"img":{"alt_text":"ciberseguro","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":78,"url":"https:\/\/www.cyberguardian.tech\/blog\/encuentro-cyber-guardian-con-empresarios-en-work-cafe-santander-bilbao-y-foro-tendencias-empresariales-de-banco-santander-en-gijon\/","url_meta":{"origin":1103,"position":3},"title":"Encuentro Cyber Guardian con empresarios en Work-Caf\u00e9 Santander Bilbao y Foro Tendencias Empresariales de Banco Santander en Gij\u00f3n.","author":"Cyber Guardian","date":"21 de abril de 2023","format":false,"excerpt":"Ayer 20 de Abril asistimos al primero de los eventos de Cyber Guardian en Work Caf\u00e9s Santander, en Bilbao, en la Plaza Moyua. Fue un encuentro con un n\u00famero importante de empresarios de Bilbao y tambi\u00e9n retransmitido por streaming. Nuestro Director de Desarrollo de Negocio, Alexis Alonso, habl\u00f3 de las\u2026","rel":"","context":"En \u00abEventos\u00bb","block_context":{"text":"Eventos","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/eventos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":156,"url":"https:\/\/www.cyberguardian.tech\/blog\/cyber-guardian-la-ciberseguridad-profesional-sin-complicaciones-para-pymes\/","url_meta":{"origin":1103,"position":4},"title":"Cyber Guardian, la ciberseguridad profesional sin complicaciones para pymes","author":"Cyber Guardian","date":"30 de junio de 2023","format":false,"excerpt":"La gesti\u00f3n de la ciberseguridad en el amplio espectro de las pymes es, en general, precaria o inexistente. Este hecho se ha intentado mitigar desde hace tiempo con formaci\u00f3n, concienciaci\u00f3n e iniciativas de divulgaci\u00f3n, que se han mostrado fallidas o poco eficientes. Para paliar esta circunstancia se construy\u00f3 en su\u2026","rel":"","context":"En \u00abArt\u00edculos Cyber Guardian\u00bb","block_context":{"text":"Art\u00edculos Cyber Guardian","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/articulos-cyber-guardian\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/sic1-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/sic1-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/sic1-1.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":190,"url":"https:\/\/www.cyberguardian.tech\/blog\/cyber-guardian-en-evento-ecosistemas-de-ciberseguridad-en-madrid\/","url_meta":{"origin":1103,"position":5},"title":"Cyber Guardian en evento \u00abEcosistemas de Ciberseguridad en Madrid\u00bb","author":"Cyber Guardian","date":"23 de febrero de 2024","format":false,"excerpt":"El pasado viernes 23 de Febrero estuvimos en el evento \u201cEcosistemas de Ciberseguridad en Madrid\u201d una jornada sobre ciberseguridad en CEIM - Confederaci\u00f3n Empresarial de Madrid-CEOE donde las principales empresas del sector de Ciberseguridad compartimos nuestra visi\u00f3n sobre la situaci\u00f3n del sector en\u00a0Madrid, los retos existentes y diferentes propuestas para\u2026","rel":"","context":"En \u00abEventos\u00bb","block_context":{"text":"Eventos","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/eventos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/posts\/1103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/comments?post=1103"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/posts\/1103\/revisions"}],"predecessor-version":[{"id":1324,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/posts\/1103\/revisions\/1324"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/media\/1120"}],"wp:attachment":[{"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/media?parent=1103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/categories?post=1103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/tags?post=1103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}