{"id":31524,"date":"2025-10-28T13:37:17","date_gmt":"2025-10-28T13:37:17","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=31524"},"modified":"2025-10-28T13:39:04","modified_gmt":"2025-10-28T13:39:04","slug":"cybersecurity-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/","title":{"rendered":"Cybersecurity in the Age of The Cloud and Artificial Intelligence"},"content":{"rendered":"\n<p>The rise of artificial intelligence marks another major turning point in the history of technology. Just as the sound of a dial-up modem once announced the arrival of the Internet in homes during the 1990s, AI has now quietly woven itself into our everyday lives\u2014so seamlessly that many people can\u2019t even recall when it first became part of their routines.<\/p>\n\n\n\n<p>\u201cIt\u2019s simply another tool, much like the Internet was in its time,\u201d said R\u00fcdiger Fogelbach, Systems Engineering Manager at Fortinet, during his presentation <a href=\"https:\/\/www.youtube.com\/watch?v=ktJkmWJ07cM\">\u201cCybersecurity in the Age of Cloud and Artificial Intelligence,\u201d<\/a> held as part of <a href=\"https:\/\/lacnic44.lacnic.net\/en\">LACNIC 44 LACNOG 2025.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">From Hype to Productivity<\/h2>\n\n\n\n<p>Fogelbach referenced Gartner\u2019s well-known \u201chype cycle,\u201d which describes the maturity path of technologies\u2014from the initial wave of excitement to their practical adoption. \u201cBack in 2013, machine learning appeared on that curve as a promising yet uncertain technology. Ten years later, it\u2019s no longer there; it has become a natural part of our lives, and its place has been taken by generative artificial intelligence,\u201d he explained.<\/p>\n\n\n\n<p>In a lively and interactive presentation, Fortinet\u2019s Systems Engineering Manager used playful examples\u2014such as identifying animals by their attributes\u2014to illustrate how algorithms learn and how AI adds context, not just data.<\/p>\n\n\n\n<p>\u201cIt\u2019s not enough to know it has long ears and a short tail\u2014you need to understand whether we\u2019re talking about a real rabbit, a stuffed toy, or a cartoon character,\u201d he joked, highlighting the difference between recognition and understanding\u2014two abilities that AI is only beginning to master.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attackers Are Learning Too<\/h2>\n\n\n\n<p>In the field of cybersecurity, the rise of artificial intelligence has two sides. On one hand, it allows manufacturers and experts to identify threats with greater speed and accuracy; on the other, it is also empowering attackers.<\/p>\n\n\n\n<p>\u201cCybercriminals are using artificial intelligence to create more disruptive attacks, automate vulnerability scanning, and design phishing campaigns that are far more convincing,\u201d warned Fogelbach. The era of the old \u201cNigerian prince\u201d email is over \u2014today\u2019s scams are personalized messages generated by artificial intelligence that mimic the tone and writing style of a boss or coworker.<\/p>\n\n\n\n<p>Deepfakes\u2014AI-manipulated images, audio, or videos\u2014mark a new frontier of deception. Fogelbach shared the case of an executive who nearly transferred funds after receiving a fake call featuring what seemed to be his superior\u2019s voice. \u201cWe now have to ask questions that challenge artificial intelligence,\u201d he advised. \u201cIf the conversation can\u2019t recall something personal, it\u2019s probably not real.\u201d<\/p>\n\n\n\n<p>According to estimates supported by AI-based tools, the effectiveness of phishing attacks has increased by 50% in recent years due to the use of these technologies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Enemy and the Weak Points<\/h2>\n\n\n\n<p>Drawing inspiration from The Art of War by Sun Tzu, Fogelbach encouraged the audience to view cybersecurity as a strategic battle. \u201cThe first step is knowing what we want to protect\u2014our digital assets. The next is understanding the adversary and recognizing our own vulnerabilities,\u201d he said.<\/p>\n\n\n\n<p>Latin America faces two major challenges: a shortage of specialized talent\u2014an estimated 700,000 cybersecurity positions remain unfilled across the region\u2014and severe technological fragmentation, with too many tools that don\u2019t communicate with each other. \u201cIt\u2019s an operational nightmare: multiple consoles, different languages, and a lack of unified visibility,\u201d he explained.<\/p>\n\n\n\n<p>Fortinet, like other security providers, has been using artificial intelligence for over a decade. Initially, it was applied to detect patterns in malicious code; later, to automate incident response; and now, to enable natural interaction with security platforms through generative AI.<\/p>\n\n\n\n<p>\u201cThe future isn\u2019t about replacing human experts\u2014it\u2019s about enhancing their defensive capabilities,\u201d he emphasized. He explained that AI systems should work hand in hand with analysts, integrated into Threat Intelligence Centers that connect data and anticipate potential attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Integration, Coordination, and Culture<\/h2>\n\n\n\n<p>To conclude, Fogelbach emphasized that an effective cybersecurity strategy relies on much more than technology alone. \u201cWe need culture, coordination, and integrated tools. It\u2019s not about having 18 different platforms\u2014it\u2019s about making sure they communicate with one another and enable a quick response to any threat,\u201d he said.<\/p>\n\n\n\n<p>As attackers continue to automate their operations and digital environments become more dispersed\u2014spanning the cloud, data centers, and remote devices\u2014cybersecurity requires a comprehensive approach.<\/p>\n\n\n\n<p>\u201cArtificial intelligence is here to stay,\u201d Fogelbach concluded. \u201cThe real difference will depend on who uses it better: the attackers or the defenders.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Cybersecurity in the Age of the Cloud and Artificial Intelligence\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/ktJkmWJ07cM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The rise of artificial intelligence marks another major turning point in the history of technology. Just as the sound of a dial-up modem once announced the arrival of the Internet in homes during the 1990s, AI has now quietly woven itself into our everyday lives\u2014so seamlessly that many people can\u2019t even recall when it first [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":31521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271,1283],"archivo":[1345,1451],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-31524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","tag-events","archivo-editions","archivo-highlights-2023"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Cybersecurity in the Age of The Cloud and Artificial Intelligence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Cybersecurity in the Age of The Cloud and Artificial Intelligence\" \/>\n<meta property=\"og:description\" content=\"The rise of artificial intelligence marks another major turning point in the history of technology. Just as the sound of a dial-up modem once announced the arrival of the Internet in homes during the 1990s, AI has now quietly woven itself into our everyday lives\u2014so seamlessly that many people can\u2019t even recall when it first [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T13:37:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-28T13:39:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Cybersecurity in the Age of The Cloud and Artificial Intelligence\",\"datePublished\":\"2025-10-28T13:37:17+00:00\",\"dateModified\":\"2025-10-28T13:39:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/\"},\"wordCount\":750,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png\",\"keywords\":[\"Cibersecurity\",\"Events\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/\",\"name\":\"LACNIC Blog | Cybersecurity in the Age of The Cloud and Artificial Intelligence\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png\",\"datePublished\":\"2025-10-28T13:37:17+00:00\",\"dateModified\":\"2025-10-28T13:39:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in the Age of The Cloud and Artificial Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Cybersecurity in the Age of The Cloud and Artificial Intelligence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Cybersecurity in the Age of The Cloud and Artificial Intelligence","og_description":"The rise of artificial intelligence marks another major turning point in the history of technology. Just as the sound of a dial-up modem once announced the arrival of the Internet in homes during the 1990s, AI has now quietly woven itself into our everyday lives\u2014so seamlessly that many people can\u2019t even recall when it first [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2025-10-28T13:37:17+00:00","article_modified_time":"2025-10-28T13:39:04+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Cybersecurity in the Age of The Cloud and Artificial Intelligence","datePublished":"2025-10-28T13:37:17+00:00","dateModified":"2025-10-28T13:39:04+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/"},"wordCount":750,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png","keywords":["Cibersecurity","Events"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/","url":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/","name":"LACNIC Blog | Cybersecurity in the Age of The Cloud and Artificial Intelligence","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png","datePublished":"2025-10-28T13:37:17+00:00","dateModified":"2025-10-28T13:39:04+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-artificial-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in the Age of The Cloud and Artificial Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/ciberseguridad-en-la-nube-ia.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":31519,"post_title":"Ciberseguridad en la era de la nube y la inteligencia artificial","slug":"ciberseguridad-inteligencia-artificial","href":"https:\/\/blog.lacnic.net\/ciberseguridad-inteligencia-artificial\/"},{"locale":"pt_BR","id":31526,"post_title":"Ciberseguran\u00e7a na era da nuvem e da intelig\u00eancia artificial","slug":"ciberseguranca-inteligencia-artificial","href":"https:\/\/blog.lacnic.net\/pt-br\/ciberseguranca-inteligencia-artificial\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/31524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=31524"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/31524\/revisions"}],"predecessor-version":[{"id":31528,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/31524\/revisions\/31528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/31521"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=31524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=31524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=31524"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=31524"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=31524"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=31524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}