{"id":1272,"date":"2026-04-15T15:38:23","date_gmt":"2026-04-15T20:38:23","guid":{"rendered":"https:\/\/crossbordertech.com\/?page_id=1272"},"modified":"2026-04-23T00:59:09","modified_gmt":"2026-04-23T05:59:09","slug":"blog","status":"publish","type":"page","link":"https:\/\/crossbordertech.com\/en\/blog\/","title":{"rendered":"Blog"},"content":{"rendered":"<div class=\"et_pb_section_0 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_0 et_pb_row et_flex_row preset--module--divi-row--default\">\n<div class=\"et_pb_column_0 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_0 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h1 class=\"et_pb_module_header\">Bienvenidos a nuestro Blog<\/h1><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_1 et_pb_row et_flex_row preset--module--divi-row--default\">\n<div class=\"et_pb_column_1 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\" data-loop-item=\"0\">\n<div class=\"et_pb_group_0 et_pb_group et_pb_module et_flex_group et_pb_css_mix_blend_mode_passthrough et_flex_column_12_24 et_flex_column_12_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_0 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module\"><div class=\"et_pb_text_inner\"><p><a href=\"https:\/\/crossbordertech.com\/en\/category\/c-soc\/\" rel=\"category tag\">C-SOC<\/a><\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_heading_1 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h3 class=\"et_pb_module_header\">La importancia del an\u00e1lisis DOFA en ciberseguridad.<\/h3><\/div><\/div>\n\n<div class=\"et_pb_text_1 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module\"><div class=\"et_pb_text_inner\"><p>Uno de los errores m\u00e1s comunes en ciberseguridad es analizar amenazas como si la empresa fuera un entorno aislado. La [&hellip;]<\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_text_2 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module\"><div class=\"et_pb_text_inner\"><p>23 April, 2026<\/p>\n<\/div><\/div>\n\n<a class=\"et_pb_link_0 et_pb_link et_pb_module et_flex_module\" href=\"https:\/\/crossbordertech.com\/en\/las-amenazas-no-nacen-solo-dentro-de-la-empresa-la-importancia-del-analisis-dofa-en-ciberseguridad\/\"><span class=\"et_pb_link_inner\">Leer m\u00e1s<\/span><\/a>\n<\/div>\n\n<div class=\"et_pb_group_1 et_pb_group et-last-child et_pb_module et_flex_group et_pb_css_mix_blend_mode_passthrough et_flex_column_12_24 et_flex_column_12_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_image_0 et_pb_image et_pb_module et_flex_module\"><span class=\"et_pb_image_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/crossbordertech.com\/wp-content\/uploads\/2026\/04\/crossborder-dofa-1024x599.png\" title=\"crossborder dofa\" width=\"1024\" height=\"599\" srcset=\"https:\/\/crossbordertech.com\/wp-content\/uploads\/2026\/04\/crossborder-dofa-980x573.png 980w, https:\/\/crossbordertech.com\/wp-content\/uploads\/2026\/04\/crossborder-dofa-480x281.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" class=\"wp-image-1295\" \/><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_joinchat":[],"footnotes":""},"class_list":["post-1272","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/crossbordertech.com\/en\/wp-json\/wp\/v2\/pages\/1272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crossbordertech.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/crossbordertech.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/crossbordertech.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/crossbordertech.com\/en\/wp-json\/wp\/v2\/comments?post=1272"}],"version-history":[{"count":12,"href":"https:\/\/crossbordertech.com\/en\/wp-json\/wp\/v2\/pages\/1272\/revisions"}],"predecessor-version":[{"id":1300,"href":"https:\/\/crossbordertech.com\/en\/wp-json\/wp\/v2\/pages\/1272\/revisions\/1300"}],"wp:attachment":[{"href":"https:\/\/crossbordertech.com\/en\/wp-json\/wp\/v2\/media?parent=1272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}