{"id":18,"date":"2025-03-02T10:24:51","date_gmt":"2025-03-02T13:24:51","guid":{"rendered":"http:\/\/www.cybersecurity.cl\/?page_id=18"},"modified":"2025-03-11T09:28:42","modified_gmt":"2025-03-11T12:28:42","slug":"servicios","status":"publish","type":"page","link":"https:\/\/cybersecurity.cl\/index.php\/servicios\/","title":{"rendered":""},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"18\" class=\"elementor elementor-18\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-774e152 e-flex e-con-boxed e-con e-parent\" data-id=\"774e152\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-933489d elementor-widget elementor-widget-heading\" data-id=\"933489d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Seis Pilares, Una Estrategia Segura<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7517b53 e-flex e-con-boxed e-con e-parent\" data-id=\"7517b53\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f201931 elementor-widget elementor-widget-text-editor\" data-id=\"f201931\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"232\" data-end=\"596\">La ciberseguridad ha dejado de ser una simple barrera contra amenazas digitales. Hoy, es un pilar estrat\u00e9gico para la continuidad, la resiliencia y el crecimiento de cualquier organizaci\u00f3n. Nuestra metodolog\u00eda no solo protege sistemas, sino que <strong data-start=\"477\" data-end=\"593\">anticipa riesgos, fortalece la infraestructura digital y transforma la seguridad en una ventaja competitiva real<\/strong>.<\/p><p data-start=\"598\" data-end=\"971\">Nuestra oferta abarca <strong data-start=\"620\" data-end=\"647\">seis pilares esenciales<\/strong> dise\u00f1ados para cubrir todas las dimensiones de la seguridad empresarial, desde auditor\u00edas avanzadas hasta estrategias de respuesta ante crisis. Cada servicio ha sido dise\u00f1ado con un enfoque ofensivo y defensivo, integrando las mejores pr\u00e1cticas de ciberseguridad con <strong data-start=\"915\" data-end=\"968\">una visi\u00f3n disruptiva y orientada a la innovaci\u00f3n<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e60136 e-flex e-con-boxed e-con e-parent\" data-id=\"7e60136\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46ee292 elementor-widget elementor-widget-spacer\" data-id=\"46ee292\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97d07c2 e-grid e-con-boxed e-con e-parent\" data-id=\"97d07c2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-05cdcb3 e-grid e-con-full e-con e-child\" data-id=\"05cdcb3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6594153 elementor-widget elementor-widget-image\" data-id=\"6594153\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/index.php\/servicios\/auditoria\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"298\" src=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-auditoria-300x298.png\" class=\"attachment-medium size-medium wp-image-228\" alt=\"\" srcset=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-auditoria-300x298.png 300w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-auditoria-150x150.png 150w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-auditoria.png 403w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab478f3 elementor-widget elementor-widget-text-editor\" data-id=\"ab478f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">\ud83d\ude80 <a href=\"\/index.php\/servicios\/auditoria\/\"><strong data-start=\"976\" data-end=\"1010\">Auditor\u00eda y Evaluaci\u00f3n<\/strong><\/a><\/p><p style=\"text-align: center;\">Exponemos vulnerabilidades antes que los atacantes, asegurando que tu infraestructura resista las amenazas m\u00e1s sofisticadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ff3ea6 e-grid e-con-full e-con e-child\" data-id=\"8ff3ea6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fd5237 elementor-widget elementor-widget-image\" data-id=\"5fd5237\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/index.php\/servicios\/infraestructura\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-infra-300x300.png\" class=\"attachment-medium size-medium wp-image-229\" alt=\"\" srcset=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-infra-300x300.png 300w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-infra-150x150.png 150w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-infra.png 405w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1bbd40 elementor-widget elementor-widget-text-editor\" data-id=\"e1bbd40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">\ud83d\udee1\ufe0f <a href=\"\/index.php\/servicios\/infraestructura\/\"><strong data-start=\"1145\" data-end=\"1177\">Protecci\u00f3n e Infraestructura<\/strong><\/a><\/p><p style=\"text-align: center;\">Dise\u00f1amos y optimizamos defensas digitales que garantizan un escudo impenetrable para datos y procesos cr\u00edticos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5a0764 e-grid e-con-full e-con e-child\" data-id=\"c5a0764\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6692d2f elementor-widget elementor-widget-image\" data-id=\"6692d2f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/index.php\/servicios\/pentesting\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-pentest-300x300.png\" class=\"attachment-medium size-medium wp-image-230\" alt=\"\" srcset=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-pentest-300x300.png 300w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-pentest-150x150.png 150w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-pentest.png 405w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e598476 elementor-widget elementor-widget-text-editor\" data-id=\"e598476\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\" data-start=\"775\" data-end=\"1011\">\ud83d\udd0d <a href=\"\/index.php\/servicios\/pentesting\/\"><strong data-start=\"1299\" data-end=\"1335\">Pentesting y Hardening<\/strong><\/a><\/p><p style=\"text-align: center;\" data-start=\"775\" data-end=\"1011\">Atacamos antes de que lo hagan otros, evaluando la resiliencia de tu empresa con t\u00e1cticas reales de ciberdelincuencia.<\/p><p style=\"text-align: center;\" data-start=\"1013\" data-end=\"1224\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4a00b9 e-grid e-con-full e-con e-child\" data-id=\"d4a00b9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-787c691 elementor-widget elementor-widget-image\" data-id=\"787c691\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/index.php\/servicios\/respuesta\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-respuesta-300x300.png\" class=\"attachment-medium size-medium wp-image-231\" alt=\"\" srcset=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-respuesta-300x300.png 300w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-respuesta-150x150.png 150w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-respuesta.png 405w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba5a225 elementor-widget elementor-widget-text-editor\" data-id=\"ba5a225\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">\u26a1 <a href=\"\/index.php\/servicios\/respuesta\/\"><strong data-start=\"1462\" data-end=\"1487\">Detecci\u00f3n y Respuesta<\/strong><\/a><\/p><p style=\"text-align: center;\">Cuando cada segundo cuenta, aseguramos que los incidentes sean neutralizados antes de que generen impacto.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3900bc e-grid e-con-full e-con e-child\" data-id=\"d3900bc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b5e8af elementor-widget elementor-widget-image\" data-id=\"8b5e8af\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/index.php\/servicios\/ot\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"296\" height=\"300\" src=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-ot-296x300.png\" class=\"attachment-medium size-medium wp-image-232\" alt=\"\" srcset=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-ot-296x300.png 296w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-ot.png 401w\" sizes=\"(max-width: 296px) 100vw, 296px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dceb38 elementor-widget elementor-widget-text-editor\" data-id=\"6dceb38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">\ud83c\udfed <a href=\"\/index.php\/servicios\/ot\/\"><strong data-start=\"1603\" data-end=\"1637\">Tecnolog\u00edas Operacionales<\/strong><\/a><\/p><p style=\"text-align: center;\">Protegemos sistemas industriales y entornos cr\u00edticos, asegurando la continuidad de la producci\u00f3n sin interrupciones.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3834cd0 e-grid e-con-full e-con e-child\" data-id=\"3834cd0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e65f6d0 elementor-widget elementor-widget-image\" data-id=\"e65f6d0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/index.php\/servicios\/gobierno\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"298\" height=\"300\" src=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-gobierno-298x300.png\" class=\"attachment-medium size-medium wp-image-233\" alt=\"\" srcset=\"https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-gobierno-298x300.png 298w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-gobierno-150x150.png 150w, https:\/\/cybersecurity.cl\/wp-content\/uploads\/2025\/03\/servicios-gobierno.png 402w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d837b40 elementor-widget elementor-widget-text-editor\" data-id=\"d837b40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">\ud83d\udcca <a href=\"\/index.php\/servicios\/gobierno\/\"><strong data-start=\"1763\" data-end=\"1797\">Estrategia y Gobierno<\/strong><\/a><\/p><p style=\"text-align: center;\">Transformamos la seguridad en un diferenciador estrat\u00e9gico, alineando la ciberseguridad con los objetivos del negocio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7541bb e-flex e-con-boxed e-con e-parent\" data-id=\"f7541bb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5773b7 elementor-widget elementor-widget-text-editor\" data-id=\"b5773b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\" data-start=\"1922\" data-end=\"2210\">Nuestra misi\u00f3n no es solo defender: <strong data-start=\"1958\" data-end=\"2039\">es hacer de la ciberseguridad un motor de crecimiento y liderazgo empresarial<\/strong>. En un mundo donde las amenazas evolucionan a diario, no basta con reaccionar; hay que anticiparse, adaptarse y controlar el riesgo antes de que se convierta en crisis.<\/p><p style=\"text-align: center;\" data-start=\"2212\" data-end=\"2312\"><strong data-start=\"2212\" data-end=\"2310\">La pregunta no es si ser\u00e1s atacado. La pregunta es si est\u00e1s preparado para resistir y liderar.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73e29dc e-grid e-con-boxed e-con e-parent\" data-id=\"73e29dc\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1e7769 elementor-widget elementor-widget-heading\" data-id=\"a1e7769\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Ciberseguridad, Consultor\u00eda, Ciberdefensa<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-100d954 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"100d954\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cybersecurity.cl\/index.php\/quienes\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Sobre Nosotros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-019a02d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"019a02d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cybersecurity.cl\/index.php\/contacto\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Cont\u00e1ctanos<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4af06ff elementor-widget elementor-widget-heading\" data-id=\"4af06ff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Ciberseguridad, Consultor\u00eda, Ciberdefensa<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Seis Pilares, Una Estrategia Segura La ciberseguridad ha dejado de ser una simple barrera contra amenazas digitales. Hoy, es un pilar estrat\u00e9gico para la continuidad, la resiliencia y el crecimiento de cualquier organizaci\u00f3n. Nuestra metodolog\u00eda no solo protege sistemas, sino que anticipa riesgos, fortalece la infraestructura digital y transforma la seguridad en una ventaja competitiva [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-18","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cybersecurity.cl\/index.php\/wp-json\/wp\/v2\/pages\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.cl\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.cl\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.cl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.cl\/index.php\/wp-json\/wp\/v2\/comments?post=18"}],"version-history":[{"count":91,"href":"https:\/\/cybersecurity.cl\/index.php\/wp-json\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":622,"href":"https:\/\/cybersecurity.cl\/index.php\/wp-json\/wp\/v2\/pages\/18\/revisions\/622"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.cl\/index.php\/wp-json\/wp\/v2\/media?parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}