{"id":105,"date":"2021-02-02T04:27:34","date_gmt":"2021-02-02T04:27:34","guid":{"rendered":"https:\/\/www.solcomp.com.mx\/blog\/?page_id=5"},"modified":"2025-03-18T15:49:25","modified_gmt":"2025-03-18T21:49:25","slug":"home","status":"publish","type":"page","link":"https:\/\/solcomp.com.mx\/blog\/","title":{"rendered":"Home"},"content":{"rendered":"<div id=\"pl-105\"  class=\"panel-layout\" ><div id=\"pg-105-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-105-0\" data-stretch-type=\"full\" ><div id=\"pgc-105-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-105-0-0-0\" class=\"so-panel widget widget_lsow-portfolio panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-lsow-portfolio so-widget-lsow-portfolio-default-1398c7c9e37b-105\"\n\t\t\t\n\t\t><div class=\"lsow-portfolio-wrap lsow-gapless-grid\"><div class=\"lsow-portfolio-header  lsow-no-heading\"><div class=\"lsow-taxonomy-filter\"><div class=\"lsow-filter-item segment-0 lsow-active\"><a data-value=\"*\" href=\"#\">All<\/a><\/div><div class=\"lsow-filter-item segment-1\"><a href=\"#\" data-value=\".term-2\" title=\"View all items filed under Noticias\">Noticias<\/a><\/div><\/div><\/div><div id=\"lsow-portfolio-69df57584c59f\" class=\"lsow-portfolio js-isotope lsow-fitRows lsow-grid-container  lsow-grid-desktop-3 lsow-grid-tablet-2 lsow-grid-mobile-1\" data-isotope-options='{ \"itemSelector\": \".lsow-portfolio-item\", \"layoutMode\": \"fitRows\"}'><div data-id=\"id-288\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-288\" class=\"post-288 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=288\" target=\"_self\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/10\/Del-ransomware-al-fraude-amenazas-que-estan-golpeando-tus-ingresos.jpg\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=288\" title=\"Del ransomware al fraude: amenazas que est\u00e1n golpeando tus ingresos\" target=\"_self\" rel=\"bookmark\">Del ransomware al fraude: amenazas que est\u00e1n golpeando tus ingresos<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=288\" title=\"Del ransomware al fraude: amenazas que est\u00e1n golpeando tus ingresos\" target=\"_self\" rel=\"bookmark\">Del ransomware al fraude: amenazas que est\u00e1n golpeando tus ingresos<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"viernes, octubre, 2025, 12:58 pm\">3 octubre, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">En ciberseguridad, el tiempo lo es todo. Detectar una amenaza tarde equivale a perder ventaja, y es justo ah\u00ed donde muchas organizaciones descubren que sus sistemas<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-279\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-279\" class=\"post-279 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=279\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/09\/Redes-de-engano-la-capa-silenciosa-que-transforma-la-ciberseguridad.png\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=279\" title=\"Redes de enga\u00f1o: la capa silenciosa que transforma la ciberseguridad\" target=\"_self\" rel=\"bookmark\">Redes de enga\u00f1o: la capa silenciosa que transforma la ciberseguridad<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=279\" title=\"Redes de enga\u00f1o: la capa silenciosa que transforma la ciberseguridad\" target=\"_self\" rel=\"bookmark\">Redes de enga\u00f1o: la capa silenciosa que transforma la ciberseguridad<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"lunes, septiembre, 2025, 10:39 am\">15 septiembre, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">En ciberseguridad, el tiempo lo es todo. Detectar una amenaza tarde equivale a perder ventaja, y es justo ah\u00ed donde muchas organizaciones descubren que sus sistemas<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-275\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-275\" class=\"post-275 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=275\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/08\/Continuidad-operativa-y-redes-de-engano.jpg\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=275\" title=\"Continuidad operativa y redes de enga\u00f1o: seguridad real para entornos OT\" target=\"_self\" rel=\"bookmark\">Continuidad operativa y redes de enga\u00f1o: seguridad real para entornos OT<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=275\" title=\"Continuidad operativa y redes de enga\u00f1o: seguridad real para entornos OT\" target=\"_self\" rel=\"bookmark\">Continuidad operativa y redes de enga\u00f1o: seguridad real para entornos OT<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"jueves, agosto, 2025, 4:46 pm\">21 agosto, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">La continuidad operativa no se improvisa: ciberseguridad, visibilidad y control son clave para innovar sin frenar procesos.<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-264\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-264\" class=\"post-264 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=264\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/07\/La-falsa-tranquilidad-digital.png\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=264\" title=\"La falsa tranquilidad digital: \u00bfpor qu\u00e9 el 90% de las decisiones sobre ciberseguridad no vienen de ciberseguridad?\" target=\"_self\" rel=\"bookmark\">La falsa tranquilidad digital: \u00bfpor qu\u00e9 el 90% de las decisiones sobre ciberseguridad no vienen de ciberseguridad?<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=264\" title=\"La falsa tranquilidad digital: \u00bfpor qu\u00e9 el 90% de las decisiones sobre ciberseguridad no vienen de ciberseguridad?\" target=\"_self\" rel=\"bookmark\">La falsa tranquilidad digital: \u00bfpor qu\u00e9 el 90% de las decisiones sobre ciberseguridad no vienen de ciberseguridad?<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"martes, julio, 2025, 4:11 pm\">8 julio, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">Transformar sin proteger es arriesgar el futuro. La ciberseguridad debe ser parte del plan, no una reacci\u00f3n tard\u00eda.<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-257\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-257\" class=\"post-257 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=257\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/06\/Transformacion-digital-con-control-real.png\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=257\" title=\"Transformaci\u00f3n digital con control real: c\u00f3mo las empresas exitosas aseguran su entorno en la nube\" target=\"_self\" rel=\"bookmark\">Transformaci\u00f3n digital con control real: c\u00f3mo las empresas exitosas aseguran su entorno en la nube<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=257\" title=\"Transformaci\u00f3n digital con control real: c\u00f3mo las empresas exitosas aseguran su entorno en la nube\" target=\"_self\" rel=\"bookmark\">Transformaci\u00f3n digital con control real: c\u00f3mo las empresas exitosas aseguran su entorno en la nube<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"jueves, junio, 2025, 1:17 pm\">19 junio, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">Digitalizar procesos no significa estar protegido. Muchas organizaciones creen tener control sobre su entorno digital, pero su seguridad real dice otra cosa.<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-249\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-249\" class=\"post-249 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=249\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/05\/14-El-riesgo-cibernetico-que-no-controlas\u2026-pero-que-igual-puede-destruir-tu-operacion-1.png\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=249\" title=\"El riesgo cibern\u00e9tico que no controlas\u2026 pero que igual puede destruir tu operaci\u00f3n\" target=\"_self\" rel=\"bookmark\">El riesgo cibern\u00e9tico que no controlas\u2026 pero que igual puede destruir tu operaci\u00f3n<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=249\" title=\"El riesgo cibern\u00e9tico que no controlas\u2026 pero que igual puede destruir tu operaci\u00f3n\" target=\"_self\" rel=\"bookmark\">El riesgo cibern\u00e9tico que no controlas\u2026 pero que igual puede destruir tu operaci\u00f3n<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"mi\u00e9rcoles, mayo, 2025, 3:41 pm\">21 mayo, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">El riesgo cibern\u00e9tico de tus proveedores puede comprometer tu empresa. Visibilidad continua es clave.\"\r\nSi deseas una versi\u00f3n alternativa con un enfoque m\u00e1s t\u00e9cnico o comercial, puedo darte otra.<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-243\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-243\" class=\"post-243 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=243\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/05\/13-Del-diagnostico-a-la-accion-como-gestionar-estrategicamente-1.png\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=243\" title=\"Del diagn\u00f3stico a la acci\u00f3n: c\u00f3mo gestionar estrat\u00e9gicamente el riesgo cibern\u00e9tico en la era digital\" target=\"_self\" rel=\"bookmark\">Del diagn\u00f3stico a la acci\u00f3n: c\u00f3mo gestionar estrat\u00e9gicamente el riesgo cibern\u00e9tico en la era digital<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=243\" title=\"Del diagn\u00f3stico a la acci\u00f3n: c\u00f3mo gestionar estrat\u00e9gicamente el riesgo cibern\u00e9tico en la era digital\" target=\"_self\" rel=\"bookmark\">Del diagn\u00f3stico a la acci\u00f3n: c\u00f3mo gestionar estrat\u00e9gicamente el riesgo cibern\u00e9tico en la era digital<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"martes, abril, 2025, 2:03 pm\">29 abril, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">Ver el riesgo no basta. Prioriza, act\u00faa y comunica con estrategia. La ciberseguridad debe hablar el idioma del negocio.<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-234\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-234\" class=\"post-234 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=234\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/04\/11-El-verdadero-costo-de-un-SOC-mal-gestionado-1.png\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=234\" title=\"El verdadero costo de un SOC mal gestionado (y c\u00f3mo evitarlo)\" target=\"_self\" rel=\"bookmark\">El verdadero costo de un SOC mal gestionado (y c\u00f3mo evitarlo)<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=234\" title=\"El verdadero costo de un SOC mal gestionado (y c\u00f3mo evitarlo)\" target=\"_self\" rel=\"bookmark\">El verdadero costo de un SOC mal gestionado (y c\u00f3mo evitarlo)<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"jueves, abril, 2025, 3:25 pm\">10 abril, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">No necesitas m\u00e1s alertas, necesitas mejores decisiones. Un SOC mal gestionado no protege\u2026 te expone. \u00bfTu centro de seguridad est\u00e1 sumando valor o solo ruido?<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-223\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-223\" class=\"post-223 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=223\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/03\/12-SOC-tradicional-vs.-SOC-optimizado-por-que-tu-seguridad-no-esta-funcionando-1.png\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=223\" title=\"SOC tradicional vs. SOC optimizado: por qu\u00e9 tu seguridad no est\u00e1 funcionando\" target=\"_self\" rel=\"bookmark\">SOC tradicional vs. SOC optimizado: por qu\u00e9 tu seguridad no est\u00e1 funcionando<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=223\" title=\"SOC tradicional vs. SOC optimizado: por qu\u00e9 tu seguridad no est\u00e1 funcionando\" target=\"_self\" rel=\"bookmark\">SOC tradicional vs. SOC optimizado: por qu\u00e9 tu seguridad no est\u00e1 funcionando<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"viernes, marzo, 2025, 3:31 pm\">28 marzo, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">\u00bfTu SOC te alerta mucho pero te protege poco? La ciberseguridad no es cuesti\u00f3n de m\u00e1s datos, sino de mejores decisiones. Optimizar tu SOC es proteger mejor, con menos ruido.<\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-175\" class=\"lsow-grid-item lsow-portfolio-item  term-2\"><article id=\"post-175\" class=\"post-175 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias\"><div class=\"lsow-project-image\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=175\" target=\"_self\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/solcomp.com.mx\/blog\/wp-content\/uploads\/2025\/03\/Seguridad-Electrica-4.0.png\" class=\"lsow-image skip-lazy no-lazyload exclude-me a3-notlazy wp-post-image\" alt=\"\" data-no-lazy=\"1\" loading=\"eager\" \/><\/a><div class=\"lsow-image-info\"><div class=\"lsow-entry-info\"><h3 class=\"lsow-post-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=175\" title=\"Seguridad El\u00e9ctrica 4.0: Defensa Cibern\u00e9tica Inteligente\" target=\"_self\" rel=\"bookmark\">Seguridad El\u00e9ctrica 4.0: Defensa Cibern\u00e9tica Inteligente<\/a><\/h3><\/div><\/div><!-- .lsow-image-info --><\/div><div class=\"lsow-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?p=175\" title=\"Seguridad El\u00e9ctrica 4.0: Defensa Cibern\u00e9tica Inteligente\" target=\"_self\" rel=\"bookmark\">Seguridad El\u00e9ctrica 4.0: Defensa Cibern\u00e9tica Inteligente<\/a><\/h3><div class=\"lsow-entry-meta\"><span class=\"author vcard\">By <a class=\"url fn n\" href=\"https:\/\/solcomp.com.mx\/blog\/?author=1\" title=\"solcomp\">solcomp<\/a><\/span><span class=\"published\"><abbr title=\"mi\u00e9rcoles, febrero, 2025, 2:12 pm\">26 febrero, 2025<\/abbr><\/span><span class=\"lsow-terms\"><a href=\"https:\/\/solcomp.com.mx\/blog\/?cat=2\">Noticias<\/a><\/span><\/div><div class=\"entry-summary\">Las el\u00e9ctricas necesitan ver m\u00e1s all\u00e1 del SCADA. La ciberseguridad OT empieza en el Nivel Cero: donde ocurren los procesos f\u00edsicos\u2026 y donde los atacantes ya est\u00e1n entrando.<\/div><\/div><\/article><!-- .hentry --><\/div><\/div><!-- .lsow-portfolio --><\/div><!-- .lsow-portfolio-wrap --><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"fullwidth.php","meta":{"_crdt_document":"","footnotes":""},"class_list":["post-105","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/solcomp.com.mx\/blog\/index.php?rest_route=\/wp\/v2\/pages\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/solcomp.com.mx\/blog\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/solcomp.com.mx\/blog\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/solcomp.com.mx\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/solcomp.com.mx\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=105"}],"version-history":[{"count":9,"href":"https:\/\/solcomp.com.mx\/blog\/index.php?rest_route=\/wp\/v2\/pages\/105\/revisions"}],"predecessor-version":[{"id":198,"href":"https:\/\/solcomp.com.mx\/blog\/index.php?rest_route=\/wp\/v2\/pages\/105\/revisions\/198"}],"wp:attachment":[{"href":"https:\/\/solcomp.com.mx\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}