{"id":380,"date":"2013-06-02T09:08:47","date_gmt":"2013-06-02T09:08:47","guid":{"rendered":"http:\/\/zephyr.us-themes.com\/blog-masonry-grid\/"},"modified":"2019-10-28T12:54:07","modified_gmt":"2019-10-28T11:54:07","slug":"comunicacion","status":"publish","type":"page","link":"https:\/\/www.sivsa.com\/site\/comunicacion\/","title":{"rendered":"COMUNICACI\u00d3N"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium width_full with_video\"><div class=\"l-section-video\"><video muted loop autoplay preload=\"auto\"><source type=\"video\/mp4\" src=\"0\" \/><\/video><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator type_invisible size_medium\"><\/div>\r\n\t<div class=\"wpb_text_column \">\r\n\t\t<div class=\"wpb_wrapper\">\r\n\t\t\t<h1 style=\"text-align: center;\">Actualidad\u00a0<strong>SIVSA<\/strong><\/h1>\n\r\n\t\t<\/div>\r\n\t<\/div>\r\n<div class=\"w-separator type_invisible size_medium\"><\/div><div class=\"w-grid type_masonry layout_8066 cols_4 lista-blog overflow_hidden with_isotope\" id=\"us_grid_1\"><style id=\"us_grid_1_css\">#us_grid_1 .w-grid-item{padding:4px}#us_grid_1 .w-grid-list{margin:-4px -4px 4px}.w-grid + #us_grid_1 .w-grid-list{margin-top:4px}.l-section.width_full .vc_row>.vc_col-sm-12>div>div>#us_grid_1 .w-grid-list{margin-left:4px; margin-right:4px}.l-section.height_auto .vc_row>.vc_col-sm-12>div>div>#us_grid_1:first-child .w-grid-list{margin-top:4px}.l-section.height_auto .vc_row>.vc_col-sm-12>div>div>#us_grid_1:last-child .w-grid-list{margin-bottom:4px}@media (max-width:1199px){#us_grid_1 .w-grid-item{width:33.333333333333%}}@media (max-width:899px){#us_grid_1 .w-grid-item{width:50%}}@media (max-width:599px){#us_grid_1 .w-grid-list{margin:0 }#us_grid_1 .w-grid-item{width:100%;padding:0; margin-bottom:4px}}<\/style><style>#us_grid_1 .w-grid-item-h{background-color:#11282e;border-radius:0.15rem;z-index:3;box-shadow:0 0.03rem 0.06rem rgba(0,0,0,0.1),0 0.10rem 0.30rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch #us_grid_1 .w-grid-item-h:hover{box-shadow:0 0.20rem 0.40rem rgba(0,0,0,0.1),0 0.67rem 2.00rem rgba(0,0,0,0.15);z-index:4}#us_grid_1 .usg_post_image_1{}#us_grid_1 .usg_post_title_1{font-family:\"Roboto\", sans-serif;font-weight:300;font-size:1.2rem}#us_grid_1 .usg_vwrapper_1{}#us_grid_1 .usg_hwrapper_1{color:#777}#us_grid_1 .usg_post_date_1{font-size:0.9rem}#us_grid_1 .usg_post_taxonomy_1{font-size:0.9rem}#us_grid_1 .usg_post_comments_1{font-size:0.9rem}#us_grid_1 .usg_post_content_1{}#us_grid_1 .usg_vwrapper_1{padding-top:32px;padding-right:40px;padding-bottom:40px;padding-left:40px}<\/style><div class=\"w-grid-list\"><article class=\"w-grid-item ratio_1x1 post-13132 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad tag-ciberseguridad tag-compromiso-de-la-cadena-de-suministro tag-mitre-attck tag-supply-chain-compromise\" data-id=\"13132\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/ataque-supply-chain-compromise\/\" rel=\"bookmark\" aria-label=\"Supply Chain Compromise: un ataque a la confianza en la cadena de suministro\"><img width=\"600\" height=\"401\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/web-600x401.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/web-600x400.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/web-300x200.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/web-1024x684.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/web-768x513.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/web.jpg 1200w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/ataque-supply-chain-compromise\/\" rel=\"bookmark\">Supply Chain Compromise: un ataque a la confianza en la cadena de suministro<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2026-02-27 11:03:48\"><i class=\"material-icons\">access_time<\/i> febrero 27, 2026<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">Los ciberdelincuentes pueden comprometer las redes de una organizaci\u00f3n sin necesidad de interactuar directamente con ellas, sirvi\u00e9ndose, para ello, de algo tan b\u00e1sico y habitual como la confianza, ya sea en un proveedor, una librer\u00eda o en una herramienta que&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13125 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad tag-ciberresiliencia tag-ue\" data-id=\"13125\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/la-ue-refuerza-con-nuevas-medidas-la-resiliencia-en-materia-de-ciberseguridad\/\" rel=\"bookmark\" aria-label=\"La UE refuerza con nuevas medidas la resiliencia en materia de ciberseguridad\"><img width=\"600\" height=\"300\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Nueve-paquete-de-medidas-ciberseguridad-UE-600x300.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Nueve-paquete-de-medidas-ciberseguridad-UE-600x300.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Nueve-paquete-de-medidas-ciberseguridad-UE-300x150.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Nueve-paquete-de-medidas-ciberseguridad-UE-1024x512.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Nueve-paquete-de-medidas-ciberseguridad-UE-768x384.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Nueve-paquete-de-medidas-ciberseguridad-UE.jpg 1500w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/la-ue-refuerza-con-nuevas-medidas-la-resiliencia-en-materia-de-ciberseguridad\/\" rel=\"bookmark\">La UE refuerza con nuevas medidas la resiliencia en materia de ciberseguridad<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2026-02-19 17:52:21\"><i class=\"material-icons\">access_time<\/i> febrero 19, 2026<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">La Comisi\u00f3n Europea ha presentado un paquete reforzado de medidas de ciberseguridad con el objetivo de blindar la Uni\u00f3n ante amenazas digitales cada vez m\u00e1s sofisticadas y persistentes. La propuesta responde al aumento de los ciberataques registrados en los \u00faltimos&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13121 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad tag-ia tag-inteligencia-artificial tag-politica-de-seguridad\" data-id=\"13121\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/la-ia-como-nuevo-actor-en-las-politicas-de-seguridad-de-la-informacion\/\" rel=\"bookmark\" aria-label=\"La IA como nuevo actor en las pol\u00edticas de seguridad de la informaci\u00f3n\"><img width=\"600\" height=\"400\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Fake-600x400.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Fake-600x400.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Fake-300x200.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Fake-1024x683.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Fake-768x512.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/02\/Fake.jpg 1200w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/la-ia-como-nuevo-actor-en-las-politicas-de-seguridad-de-la-informacion\/\" rel=\"bookmark\">La IA como nuevo actor en las pol\u00edticas de seguridad de la informaci\u00f3n<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2026-02-06 08:15:56\"><i class=\"material-icons\">access_time<\/i> febrero 6, 2026<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">Recientemente han saltado a los medios varias noticias sobre profesionales, en concreto de un abogado y un magistrado,\u00a0que en sus respectivos escritos y\u00a0resoluciones hab\u00edan citado sentencias presuntamente favorables a sus criterios y que resultaron provenir de una b\u00fasqueda mediante Inteligencia&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13116 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad\" data-id=\"13116\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/riesgos-de-la-dependencia-europea-de-proveedores-externos-en-tecnologias-criticas\/\" rel=\"bookmark\" aria-label=\"Riesgos de la dependencia europea de proveedores externos en tecnolog\u00edas cr\u00edticas\"><img width=\"600\" height=\"338\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/devices-data-center-employing-machine-learning-technology-600x338.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/devices-data-center-employing-machine-learning-technology-600x338.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/devices-data-center-employing-machine-learning-technology-300x169.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/devices-data-center-employing-machine-learning-technology-1024x576.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/devices-data-center-employing-machine-learning-technology-768x432.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/devices-data-center-employing-machine-learning-technology.jpg 1500w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/riesgos-de-la-dependencia-europea-de-proveedores-externos-en-tecnologias-criticas\/\" rel=\"bookmark\">Riesgos de la dependencia europea de proveedores externos en tecnolog\u00edas cr\u00edticas<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2026-01-30 08:24:31\"><i class=\"material-icons\">access_time<\/i> enero 30, 2026<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">Europa presenta una gran dependencia estructural de proveedores externos en software, nube, ciberseguridad y tecnolog\u00edas cr\u00edticas, lo que la exponen a vulnerabilidades estrat\u00e9gicas. El informe \u201cEuropean Software an Cyber \u200b\u200bDependencies\u201d , elaborado por el Departamento de Pol\u00edticas de Transformaci\u00f3n, Innovaci\u00f3n&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13111 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad tag-digitalizacion tag-ehealth tag-salud-digital\" data-id=\"13111\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/digitalizacion-de-la-salud-publica-claves-y-riesgos\/\" rel=\"bookmark\" aria-label=\"Digitalizaci\u00f3n de la salud p\u00fablica: claves y riesgos\"><img width=\"600\" height=\"400\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Digitalizacio\u0301n-salud-pu\u0301blica-600x400.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Digitalizacio\u0301n-salud-pu\u0301blica-600x400.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Digitalizacio\u0301n-salud-pu\u0301blica-300x200.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Digitalizacio\u0301n-salud-pu\u0301blica-1024x683.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Digitalizacio\u0301n-salud-pu\u0301blica-768x512.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Digitalizacio\u0301n-salud-pu\u0301blica.jpg 1500w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/digitalizacion-de-la-salud-publica-claves-y-riesgos\/\" rel=\"bookmark\">Digitalizaci\u00f3n de la salud p\u00fablica: claves y riesgos<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2026-01-16 09:00:18\"><i class=\"material-icons\">access_time<\/i> enero 16, 2026<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">La digitalizaci\u00f3n de la salud p\u00fablica se ha convertido en una pieza clave para reforzar la resiliencia de los sistemas sanitarios, mejorar la salud poblacional y preparar mejor a los pa\u00edses frente a futuras crisis como la COVID\u201119. En el&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13105 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized tag-ciberamenazas tag-ciberseguridad tag-search-threat-vendor-data\" data-id=\"13105\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/en-que-consiste-el-search-threat-vendor-data\/\" rel=\"bookmark\" aria-label=\"Search Threat Vendor Data: cuando los atacantes esp\u00edan a los cazadores de ciberamenazas\"><img width=\"600\" height=\"336\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Search-600x336.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Search-600x336.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Search-300x168.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Search-1024x574.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Search-768x431.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2026\/01\/Search.jpg 1500w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/en-que-consiste-el-search-threat-vendor-data\/\" rel=\"bookmark\">Search Threat Vendor Data: cuando los atacantes esp\u00edan a los cazadores de ciberamenazas<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2026-01-09 13:47:24\"><i class=\"material-icons\">access_time<\/i> enero 9, 2026<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/uncategorized\/\">Uncategorized<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">Imagina que publicas un informe detallado sobre un malware que est\u00e1 atacando a tus clientes, incluyendo hashes, IP maliciosas y dominios de comando y control. Lo que desconoces es que los propios atacantes est\u00e1n leyendo tu informe en tiempo real&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13094 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad tag-ciberseguridad tag-salud tag-sns\" data-id=\"13094\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/estrategia-de-ciberseguridad-del-sistema-nacional-de-salud-una-oportunidad-para-el-sector-tic-en-salud\/\" rel=\"bookmark\" aria-label=\"Estrategia de Ciberseguridad del Sistema Nacional de Salud: una oportunidad para el sector TIC en salud\"><img width=\"600\" height=\"300\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-600x300.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-600x300.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-300x150.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-1024x512.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-768x384.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web.jpg 1500w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/estrategia-de-ciberseguridad-del-sistema-nacional-de-salud-una-oportunidad-para-el-sector-tic-en-salud\/\" rel=\"bookmark\">Estrategia de Ciberseguridad del Sistema Nacional de Salud: una oportunidad para el sector TIC en salud<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2025-12-26 08:00:32\"><i class=\"material-icons\">access_time<\/i> diciembre 26, 2025<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">La Estrategia de Ciberseguridad del Sistema Nacional de Salud (SNS) 2025\u20112028 marca un punto de inflexi\u00f3n en c\u00f3mo se entiende y se gestiona la seguridad en el entorno sanitario digital. Para el ecosistema TIC, supone un marco com\u00fan que alinea&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13090 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad tag-ciberamenaza tag-ciberseguridad tag-impacto tag-mitreattck\" data-id=\"13090\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/impacto-un-ataque-al-corazon-del-negocio\/\" rel=\"bookmark\" aria-label=\"Impacto: un ataque al coraz\u00f3n del negocio\"><img width=\"600\" height=\"400\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-imapcto-600x400.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-imapcto-600x400.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-imapcto-300x200.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-imapcto-1024x683.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-imapcto-768x512.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/12\/web-imapcto.jpg 1500w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/impacto-un-ataque-al-corazon-del-negocio\/\" rel=\"bookmark\">Impacto: un ataque al coraz\u00f3n del negocio<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2025-12-05 08:00:29\"><i class=\"material-icons\">access_time<\/i> diciembre 5, 2025<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">Destruir datos, interrumpir servicios o causar fallos en procesos cr\u00edticos para el funcionamiento de una organizaci\u00f3n. Este es el objetivo de la t\u00e1ctica \u201cImpacto\u201d, utilizada por los cibercriminales para provocar un da\u00f1o tangible en los sistemas o negocios de una&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13086 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad tag-centros-de-datos tag-centros-de-datos-energia-positiva tag-eficiencia-energetica\" data-id=\"13086\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/centros-de-datos-de-energia-positiva\/\" rel=\"bookmark\" aria-label=\"Centros de datos de energ\u00eda positiva. \u00bfLa respuesta para alinear el crecimiento del sector digital con los objetivos clim\u00e1ticos globales?\"><img width=\"600\" height=\"400\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/web-600x400.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/web-600x400.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/web-300x200.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/web-1024x683.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/web-768x512.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/web.jpg 1500w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/centros-de-datos-de-energia-positiva\/\" rel=\"bookmark\">Centros de datos de energ\u00eda positiva. \u00bfLa respuesta para alinear el crecimiento del sector digital con los objetivos clim\u00e1ticos globales?<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2025-11-28 08:00:15\"><i class=\"material-icons\">access_time<\/i> noviembre 28, 2025<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">Los centros de datos energ\u00e9ticamente positivos representan una clave de innovaci\u00f3n para afrontar el desaf\u00edo del cambio clim\u00e1tico en el sector tecnol\u00f3gico. Estos centros no solo buscan operar con eficiencia energ\u00e9tica, sino tambi\u00e9n contribuir a mejorar la de su entorno&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<article class=\"w-grid-item ratio_1x1 post-13076 post type-post status-publish format-standard has-post-thumbnail hentry category-actualidad tag-metadatos\" data-id=\"13076\">\r\n\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t<div class=\"w-grid-item-elm usg_post_image_1  post_image\"><a href=\"https:\/\/www.sivsa.com\/site\/que-son-los-metadatos-y-como-y-cuando-debes-eliminarlos\/\" rel=\"bookmark\" aria-label=\"\u00bfQu\u00e9 son los metadatos y c\u00f3mo y cu\u00e1ndo debes eliminarlos?\"><img width=\"600\" height=\"400\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/27a640ac-dc58-696b-f63a-6e731b758981-600x400.jpg\" class=\"attachment-us_600_0 size-us_600_0 wp-post-image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/27a640ac-dc58-696b-f63a-6e731b758981-600x400.jpg 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/27a640ac-dc58-696b-f63a-6e731b758981-300x200.jpg 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/27a640ac-dc58-696b-f63a-6e731b758981-1024x683.jpg 1024w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/27a640ac-dc58-696b-f63a-6e731b758981-768x512.jpg 768w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2025\/11\/27a640ac-dc58-696b-f63a-6e731b758981.jpg 1500w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top \"><h2 class=\"w-grid-item-elm usg_post_title_1 color_link_inherit  post_title entry-title\"><a href=\"https:\/\/www.sivsa.com\/site\/que-son-los-metadatos-y-como-y-cuando-debes-eliminarlos\/\" rel=\"bookmark\">\u00bfQu\u00e9 son los metadatos y c\u00f3mo y cu\u00e1ndo debes eliminarlos?<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 align_left valign_top wrap \"><time class=\"w-grid-item-elm usg_post_date_1  post_date entry-date published\" datetime=\"2025-11-21 08:00:04\"><i class=\"material-icons\">access_time<\/i> noviembre 21, 2025<\/time><div class=\"w-grid-item-elm usg_post_taxonomy_1 color_link_inherit  post_taxonomy style_simple\"><i class=\"material-icons\">folder_open<\/i> <a href=\"https:\/\/www.sivsa.com\/site\/category\/actualidad\/\">Actualidad<\/a><\/div><\/div><div class=\"w-grid-item-elm usg_post_content_1  post_content\">Los metadatos se definen como \u201clos datos de los datos\u201d, es decir, proporcionan informaci\u00f3n que no se ve a simple vista, pero que est\u00e1 vinculada a un archivo (de texto, imagen, audio, v\u00eddeo\u2026), y lo describe. Ofrecen detalles sobre las&hellip;<\/div><\/div>\t<\/div>\r\n<\/article>\r\n<\/div>\t\t<div class=\"g-loadmore type_block\">\r\n\t\t\t<a class=\"g-loadmore-btn\" href=\"javascript:void(0)\">\r\n\t\t\t\t<span>Cargar m\u00e1s<\/span>\r\n\t\t\t<\/a>\r\n\t\t\t<div class=\"g-preloader type_1\">\r\n\t\t\t\t<div><\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t<div class=\"w-grid-json hidden\" onclick='return {&quot;ajax_url&quot;:&quot;https:\\\/\\\/www.sivsa.com\\\/site\\\/wp-admin\\\/admin-ajax.php&quot;,&quot;permalink_url&quot;:&quot;https:\\\/\\\/www.sivsa.com\\\/site\\\/que-son-los-metadatos-y-como-y-cuando-debes-eliminarlos\\\/&quot;,&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;max_num_pages&quot;:40,&quot;infinite_scroll&quot;:true,&quot;template_vars&quot;:{&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;},&quot;posts_per_page&quot;:&quot;10&quot;,&quot;post_status&quot;:[&quot;publish&quot;]},&quot;post_id&quot;:380,&quot;us_grid_index&quot;:1,&quot;exclude_items&quot;:&quot;none&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;items_layout&quot;:&quot;8066&quot;,&quot;type&quot;:&quot;masonry&quot;,&quot;columns&quot;:&quot;4&quot;,&quot;img_size&quot;:&quot;us_600_0&quot;},&quot;carousel_settings&quot;:{&quot;items&quot;:&quot;4&quot;,&quot;nav&quot;:0,&quot;dots&quot;:0,&quot;center&quot;:0,&quot;autoplay&quot;:0,&quot;timeout&quot;:3000,&quot;autoheight&quot;:0,&quot;slideby&quot;:&quot;1&quot;},&quot;carousel_breakpoints&quot;:{&quot;1200&quot;:{&quot;items&quot;:&quot;4&quot;},&quot;900&quot;:{&quot;items&quot;:3,&quot;autoplay&quot;:1,&quot;autoplayHoverPausev&quot;:1},&quot;600&quot;:{&quot;items&quot;:2,&quot;autoplay&quot;:1,&quot;autoplayHoverPausev&quot;:1},&quot;0&quot;:{&quot;items&quot;:1,&quot;autoHeight&quot;:true,&quot;autoplay&quot;:1,&quot;autoplayHoverPause&quot;:1}}}'><\/div>\r\n<\/div><\/div><\/div><\/div><\/div><\/div><\/section><!-- Row Backgrounds --><div class=\"upb_color\" data-bg-override=\"0\" data-bg-color=\"#415358\" data-fadeout=\"\" data-fadeout-percentage=\"30\" data-parallax-content=\"\" data-parallax-content-sense=\"30\" data-row-effect-mobile-disable=\"true\" data-img-parallax-mobile-disable=\"true\" data-rtl=\"false\"  data-custom-vc-row=\"\"  data-vc=\"4.12\"  data-theme-support=\"\"   data-overlay=\"false\" data-overlay-color=\"\" data-overlay-pattern=\"\" data-overlay-pattern-opacity=\"\" data-overlay-pattern-size=\"\"    ><\/div>\n","protected":false},"excerpt":{"rendered":"Los metadatos se definen como \u201clos datos de los datos\u201d, es decir, proporcionan informaci\u00f3n que no se ve a simple vista, pero que est\u00e1 vinculada a un archivo (de texto, imagen, audio, v\u00eddeo\u2026), y lo describe. Ofrecen detalles sobre las caracter\u00edsticas o atributos de un recurso como la fecha de creaci\u00f3n, el autor o el...","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"xn-wppe-expiration":[],"xn-wppe-expiration-action":[],"xn-wppe-expiration-prefix":[]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>COMUNICACI\u00d3N - SIVSA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sivsa.com\/site\/comunicacion\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"COMUNICACI\u00d3N - SIVSA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sivsa.com\/site\/comunicacion\/\" \/>\n<meta property=\"og:site_name\" content=\"SIVSA\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-28T11:54:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:site\" content=\"@sivsa_es\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sivsa.com\/site\/comunicacion\/\",\"url\":\"https:\/\/www.sivsa.com\/site\/comunicacion\/\",\"name\":\"COMUNICACI\u00d3N - SIVSA\",\"isPartOf\":{\"@id\":\"https:\/\/www.sivsa.com\/site\/#website\"},\"datePublished\":\"2013-06-02T09:08:47+00:00\",\"dateModified\":\"2019-10-28T11:54:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sivsa.com\/site\/comunicacion\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sivsa.com\/site\/comunicacion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sivsa.com\/site\/comunicacion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.sivsa.com\/site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"COMUNICACI\u00d3N\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sivsa.com\/site\/#website\",\"url\":\"https:\/\/www.sivsa.com\/site\/\",\"name\":\"SIVSA\",\"description\":\"SIVSA. Communicate in technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sivsa.com\/site\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"COMUNICACI\u00d3N - SIVSA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sivsa.com\/site\/comunicacion\/","og_locale":"es_ES","og_type":"article","og_title":"COMUNICACI\u00d3N - SIVSA","og_url":"https:\/\/www.sivsa.com\/site\/comunicacion\/","og_site_name":"SIVSA","article_modified_time":"2019-10-28T11:54:07+00:00","twitter_card":"summary","twitter_site":"@sivsa_es","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sivsa.com\/site\/comunicacion\/","url":"https:\/\/www.sivsa.com\/site\/comunicacion\/","name":"COMUNICACI\u00d3N - SIVSA","isPartOf":{"@id":"https:\/\/www.sivsa.com\/site\/#website"},"datePublished":"2013-06-02T09:08:47+00:00","dateModified":"2019-10-28T11:54:07+00:00","breadcrumb":{"@id":"https:\/\/www.sivsa.com\/site\/comunicacion\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sivsa.com\/site\/comunicacion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sivsa.com\/site\/comunicacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.sivsa.com\/site\/"},{"@type":"ListItem","position":2,"name":"COMUNICACI\u00d3N"}]},{"@type":"WebSite","@id":"https:\/\/www.sivsa.com\/site\/#website","url":"https:\/\/www.sivsa.com\/site\/","name":"SIVSA","description":"SIVSA. Communicate in technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sivsa.com\/site\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/pages\/380"}],"collection":[{"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":16,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/pages\/380\/revisions"}],"predecessor-version":[{"id":10251,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/pages\/380\/revisions\/10251"}],"wp:attachment":[{"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/media?parent=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}