{"id":5980,"date":"2017-04-03T10:48:56","date_gmt":"2017-04-03T08:48:56","guid":{"rendered":"http:\/\/inprosec.com\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/"},"modified":"2023-05-16T17:55:09","modified_gmt":"2023-05-16T15:55:09","slug":"las-nuevas-fronteras-de-la-seguridad-de-la-informacion","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/","title":{"rendered":"The New Frontiers of Information Security"},"content":{"rendered":"<p>The number of devices connected to the network is multiplying (PC, refrigerators, cars, airplanes, pacemakers &#8230;), while cybercriminals develop imaginative formulas to deceive these machines and the people behind these machines.<\/p>\n<p>A malware in the pacemaker of a researcher almost ends her life several years ago. This case highlights the need to protect our most valuable information from hackers.<\/p>\n<p>The next generation 5G will make the Internet of Things happen. Will we be prepared to safely adopt advances such as the intelligent home or the autonomous car? Will the latter become a powerful weapon of covert assassination?<\/p>\n<p>The only solution is to add intelligence to the detection. Thousands of companies and start up around the world try to go one step ahead of the bad ones.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The number of devices connected to the network is multiplying (PC, refrigerators, cars, airplanes, pacemakers &#8230;), while cybercriminals develop imaginative formulas to deceive these machines and the people behind these machines. A malware in the pacemaker of a researcher almost ends her life several years ago. This case highlights the need to protect our most&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-5980","post","type-post","status-publish","format-standard","hentry","category-general"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The New Frontiers of Information Security - Inprosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The New Frontiers of Information Security\" \/>\n<meta property=\"og:description\" content=\"The number of devices connected to the network is multiplying (PC, refrigerators, cars, airplanes, pacemakers &#8230;), while cybercriminals develop imaginative formulas to deceive these machines and the people behind these machines. A malware in the pacemaker of a researcher almost ends her life several years ago. This case highlights the need to protect our most...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-03T08:48:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T15:55:09+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\"},\"headline\":\"The New Frontiers of Information Security\",\"datePublished\":\"2017-04-03T08:48:56+00:00\",\"dateModified\":\"2023-05-16T15:55:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/\"},\"wordCount\":131,\"commentCount\":0,\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/\",\"name\":\"The New Frontiers of Information Security - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2017-04-03T08:48:56+00:00\",\"dateModified\":\"2023-05-16T15:55:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The New Frontiers of Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The New Frontiers of Information Security - Inprosec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/","og_locale":"en_US","og_type":"article","og_title":"The New Frontiers of Information Security","og_description":"The number of devices connected to the network is multiplying (PC, refrigerators, cars, airplanes, pacemakers &#8230;), while cybercriminals develop imaginative formulas to deceive these machines and the people behind these machines. A malware in the pacemaker of a researcher almost ends her life several years ago. This case highlights the need to protect our most...","og_url":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/","og_site_name":"Inprosec","article_published_time":"2017-04-03T08:48:56+00:00","article_modified_time":"2023-05-16T15:55:09+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/"},"author":{"name":"admin","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c"},"headline":"The New Frontiers of Information Security","datePublished":"2017-04-03T08:48:56+00:00","dateModified":"2023-05-16T15:55:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/"},"wordCount":131,"commentCount":0,"articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/","url":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/","name":"The New Frontiers of Information Security - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2017-04-03T08:48:56+00:00","dateModified":"2023-05-16T15:55:09+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c"},"breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/las-nuevas-fronteras-de-la-seguridad-de-la-informacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"The New Frontiers of Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/5980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=5980"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/5980\/revisions"}],"predecessor-version":[{"id":9027,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/5980\/revisions\/9027"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=5980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=5980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=5980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}