{"id":2870,"date":"2013-04-17T13:15:40","date_gmt":"2013-04-17T13:15:40","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/?p=2870"},"modified":"2018-11-09T13:25:30","modified_gmt":"2018-11-09T13:25:30","slug":"overcoming-mistrust-in-order-to-deal-with-computer-security-incidents","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/","title":{"rendered":"\u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d"},"content":{"rendered":"<p><strong>OAS Expert<\/strong><\/p>\n<p>One of the main challenges in dealing with computer security incidents within the region is overcoming mistrust and sharing information with national and international response teams, Belisario Contreras, program manager for the OAS Inter-American Committee against Terrorism (CICTE), told Lacnic News.<\/p>\n<p>In the opinion of the OAS expert, institutions that fall victim to computer security incidents \u201cdo not share this information\u201d with incident response teams out of \u201cmistrust\u201d or \u201cignorance,\u201d which helps those responsible for the attacks avoid being prosecuted and punished.<\/p>\n<p>Contreras believes it is essential to create awareness on the major threats experienced in each country to develop common response strategies throughout the region. \u201cOften due to the potential damage to their image, others due to the fear of sharing sensitive information, or simply out of ignorance, the fact is that institutions find it difficult to report computer security incidents,\u201d said Contreras.<\/p>\n<p>The CICTE program manager acknowledged that the number of attacks in the region continues to grow and that these attacks are becoming increasingly sophisticated. The lack of information makes it impossible to quantify the economic damage these computer security incidents are causing the continent.<\/p>\n<p>In addition to National Computer Emergency Response Teams (CERT), the sophistication of these attacks has led some governments to create their own computer security law enforcement units to prosecute those responsible for the attacks. Such is the case of Colombia, a country that has implemented various teams at state, police and military level, said Contreras.<\/p>\n<p>There are already 18 national CERTs in the Americas. The OAS expert noted that the region&#8217;s governments are prioritizing cybersecurity because they consider computer security incidents to be an authentic threat to Internet stability. In this regard, Contreras said that the OAS is working together with the region&#8217;s Ministries of Justice to change the countries&#8217; legislations. \u201cWe have a group specializing in cybercrime that recommends that countries modify their laws to allow dealing with computer incidents,\u201d said Contreras.<\/p>\n<p>The expert admitted that the Internet&#8217;s impact on people&#8217;s lives continues to grow and that the law must be adapted without curtailing freedoms. According to the OAS official, \u201cit is a great myth\u201d that \u201cgreater Internet security\u201d will \u201ccurtail\u201d freedoms.<\/p>\n<p>\u201cSecurity should not go against the fundamental rights of human beings. Increasing Internet security does not mean that an Internet police will be trying to prevent certain publications. The idea is to adapt national legislations to allow proper use of the Internet. States should protect their citizens,\u201d said Contreras.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OAS Expert One of the main challenges in dealing with computer security incidents within the region is overcoming mistrust and sharing information with national and international response teams, Belisario Contreras, program manager for the OAS Inter-American Committee against Terrorism (CICTE), told Lacnic News. In the opinion of the OAS expert, institutions that fall victim to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":11183,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[629,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-2870","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-april-2013-edition","archivo-editions"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | \u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | \u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d\" \/>\n<meta property=\"og:description\" content=\"OAS Expert One of the main challenges in dealing with computer security incidents within the region is overcoming mistrust and sharing information with national and international response teams, Belisario Contreras, program manager for the OAS Inter-American Committee against Terrorism (CICTE), told Lacnic News. In the opinion of the OAS expert, institutions that fall victim to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-17T13:15:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-09T13:25:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"383\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"LACNIC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/\"},\"author\":{\"name\":\"LACNIC\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\"},\"headline\":\"\u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d\",\"datePublished\":\"2013-04-17T13:15:40+00:00\",\"dateModified\":\"2018-11-09T13:25:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/\"},\"wordCount\":421,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/\",\"name\":\"LACNIC Blog | \u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\",\"datePublished\":\"2013-04-17T13:15:40+00:00\",\"dateModified\":\"2018-11-09T13:25:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\",\"width\":680,\"height\":383},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\",\"name\":\"LACNIC\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | \u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | \u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d","og_description":"OAS Expert One of the main challenges in dealing with computer security incidents within the region is overcoming mistrust and sharing information with national and international response teams, Belisario Contreras, program manager for the OAS Inter-American Committee against Terrorism (CICTE), told Lacnic News. In the opinion of the OAS expert, institutions that fall victim to [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2013-04-17T13:15:40+00:00","article_modified_time":"2018-11-09T13:25:30+00:00","og_image":[{"width":680,"height":383,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","type":"image\/jpeg"}],"author":"LACNIC","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/"},"author":{"name":"LACNIC","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9"},"headline":"\u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d","datePublished":"2013-04-17T13:15:40+00:00","dateModified":"2018-11-09T13:25:30+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/"},"wordCount":421,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/","url":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/","name":"LACNIC Blog | \u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","datePublished":"2013-04-17T13:15:40+00:00","dateModified":"2018-11-09T13:25:30+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","width":680,"height":383},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"\u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9","name":"LACNIC","url":"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":2868,"post_title":"\u201cSuperar la desconfianza para  enfrentar incidentes inform\u00e1ticos\u201d","slug":"superar-la-desconfianza-para-enfrentar-incidentes-informaticos-2","href":"https:\/\/blog.lacnic.net\/superar-la-desconfianza-para-enfrentar-incidentes-informaticos-2\/"},{"locale":"pt_BR","id":2871,"post_title":"\u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d","slug":"superar-a-desconfianca-para-enfrentar-incidentes-informaticos","href":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/2870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=2870"}],"version-history":[{"count":6,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/2870\/revisions"}],"predecessor-version":[{"id":11185,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/2870\/revisions\/11185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/11183"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=2870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=2870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=2870"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=2870"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=2870"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=2870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}