{"id":10,"date":"2025-04-20T02:44:42","date_gmt":"2025-04-20T02:44:42","guid":{"rendered":"https:\/\/hackingdoc.com\/?page_id=10"},"modified":"2025-04-29T23:14:55","modified_gmt":"2025-04-29T23:14:55","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/hackingdoc.com\/en\/","title":{"rendered":"Ciberseguridad"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; custom_padding=&#8221;||0px|||&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;80px||||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;||||false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;0c1d619a-7717-4f60-ae3d-937966ebae21&#8243; header_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.<\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/open.spotify.com\/show\/3xMJf78MkSPCv6zEBtqH0Z&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;siguenos en spotify&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;545caba7-d4f9-472b-ab6a-2b1ff7b7fe20&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/1745205192282.png&#8221; title_text=&#8221;1745205192282&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|-10vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw||0vw|false|true&#8221; custom_margin_phone=&#8221;|0vw||0vw|false|true&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; scroll_fade_enable=&#8221;on&#8221; scroll_fade=&#8221;0|40|40|100|100%|100|30%&#8221; scroll_scaling_enable=&#8221;on&#8221; scroll_scaling=&#8221;0|50|50|100|100%|100|110%&#8221; scroll_blur_enable=&#8221;on&#8221; scroll_blur=&#8221;0|40|60|100|0px|0px|10px&#8221; motion_trigger_start=&#8221;bottom&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; custom_padding=&#8221;2px|||||&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;Episodios&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;571b98b5-07b0-43e3-a456-a8d4a83b3b5e&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span data-huuid=\"2845113885410752774\">Episodios<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<div id=\"3563169908\" class=\"castos-player light-mode \" tabindex=\"0\" data-episode=\"135\" data-player_id=\"3563169908\">\n\t<div class=\"player\">\n\t\t<div class=\"player__main\">\n\t\t\t<div class=\"player__artwork player__artwork-135\">\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-7-150x150.jpg\"\n\t\t\t\t\t alt=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\"\n\t\t\t\t\t title=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\n\t\t\t<\/div>\n\t\t\t<div class=\"player__body\">\n\t\t\t\t<div class=\"currently-playing\">\n\t\t\t\t\t<div class=\"show player__podcast-title\">\n\t\t\t\t\t\t\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"episode-title player__episode-title\">\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"play-progress\">\n\t\t\t\t\t<div class=\"play-pause-controls\">\n\t\t\t\t\t\t<button title=\"Play\" aria-label=\"Play Episode\" aria-pressed=\"false\" class=\"play-btn\">\n\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Play Episode<\/span>\n\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t<button title=\"Pause\" aria-label=\"Pause Episode\" aria-pressed=\"false\" class=\"pause-btn hide\">\n\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Pause Episode<\/span>\n\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/plugins\/seriously-simple-podcasting\/assets\/css\/images\/player\/images\/icon-loader.svg\" alt=\"Loading\" class=\"ssp-loader hide\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-135\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94356022\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-13%2Fd71d7f2f-642e-49c6-dfca-4991998ce2c2.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t\t<div class=\"ssp-progress\" role=\"progressbar\" title=\"Seek\" aria-valuenow=\"0\" aria-valuemin=\"0\" aria-valuemax=\"0\">\n\t\t\t\t\t\t\t<span class=\"progress__filled\"><\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"ssp-playback playback\">\n\t\t\t\t\t\t\t<div class=\"playback__controls\">\n\t\t\t\t\t\t\t\t<button class=\"player-btn player-btn__volume\" title=\"Mute\/Unmute\">\n\t\t\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Mute\/Unmute Episode<\/span>\n\t\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t\t<button data-skip=\"-10\" class=\"player-btn player-btn__rwd\" title=\"Rewind 10 seconds\">\n\t\t\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Rewind 10 Seconds<\/span>\n\t\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t\t<button data-speed=\"1\" class=\"player-btn player-btn__speed\" title=\"Playback Speed\" aria-label=\"Playback Speed\">1x<\/button>\n\t\t\t\t\t\t\t\t<button data-skip=\"30\" class=\"player-btn player-btn__fwd\" title=\"Fast Forward 30 seconds\">\n\t\t\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Fast Forward 30 seconds<\/span>\n\t\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"playback__timers\">\n\t\t\t\t\t\t\t\t<time class=\"ssp-timer\">00:00<\/time>\n\t\t\t\t\t\t\t\t<span>\/<\/span>\n\t\t\t\t\t\t\t\t<!-- We need actual duration here from the server -->\n\t\t\t\t\t\t\t\t<time class=\"ssp-duration\" datetime=\"PT0H0M0S\"><\/time>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<nav class=\"player-panels-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"subscribe-btn\" id=\"subscribe-btn-135\" title=\"Subscribe\">Subscribe<\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"share-btn\" id=\"share-btn-135\" title=\"Share\">Share<\/button>\n\t\t\t\t\t\t\t\t\t\t\t<\/nav>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"player-panels player-panels-135\">\n\t\t\t\t\t\t\t<div class=\"subscribe player-panel subscribe-135\">\n\t\t\t\t\t<div class=\"close-btn close-btn-135\">\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"panel__inner\">\n\t\t\t\t\t\t<div class=\"subscribe-icons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/open.spotify.com\/show\/3xMJf78MkSPCv6zEBtqH0Z\" target=\"_blank\" rel=\"noopener noreferrer\"\n\t\t\t\t\t\t\t\t\t   class=\"spotify\"\n\t\t\t\t\t\t\t\t\t   title=\"Subscribe on  Spotify\">\n\t\t\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t\t\t\tSpotify\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"player-panel-row\" aria-label=\"RSS Feed URL\">\n\t\t\t\t\t\t\t<div class=\"title\">RSS Feed<\/div>\n\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<input value=\"https:\/\/hackingdoc.com\/en\/feed\/podcast\/hackingdoc-com\" class=\"input-rss input-rss-135\" title=\"RSS Feed URL\" readonly \/>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<button class=\"copy-rss copy-rss-135\" title=\"Copy RSS Feed URL\" aria-label=\"Copy RSS Feed URL\"><\/button>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"share share-135 player-panel\">\n\t\t\t\t\t<div class=\"close-btn close-btn-135\">\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"player-panel-row\">\n\t\t\t\t\t\t<div class=\"title\">\n\t\t\t\t\t\t\tShare\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"icons-holder\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10&t=\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\"\n\t\t\t\t\t\t\t   target=\"_blank\" rel=\"noopener noreferrer\" class=\"share-icon facebook\" title=\"Share on Facebook\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?text=https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10&url=\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\"\n\t\t\t\t\t\t\t   target=\"_blank\" rel=\"noopener noreferrer\" class=\"share-icon twitter\" title=\"Share on Twitter\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<a href=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94356022\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-13%2Fd71d7f2f-642e-49c6-dfca-4991998ce2c2.mp3\"\n\t\t\t\t\t\t\t   target=\"_blank\" rel=\"noopener noreferrer\" class=\"share-icon download\" title=\"Download\" download>\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"player-panel-row\">\n\t\t\t\t\t\t<div class=\"title\">\n\t\t\t\t\t\t\tLink\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t<input value=\"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10\" class=\"input-link input-link-135\" title=\"Episode URL\" readonly \/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<button class=\"copy-link copy-link-135\" title=\"Copy Episode URL\" aria-label=\"Copy Episode URL\" readonly=\"\"><\/button>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"player-panel-row\">\n\t\t\t\t\t\t<div class=\"title\">\n\t\t\t\t\t\t\tEmbed\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div style=\"height: 10px;\">\n\t\t\t\t\t\t\t<input type=\"text\" value='&lt;blockquote class=&quot;wp-embedded-content&quot; data-secret=&quot;pB9YpxUGVS&quot;&gt;&lt;a href=&quot;https:\/\/hackingdoc.com\/en\/&quot;&gt;Ciberseguridad&lt;\/a&gt;&lt;\/blockquote&gt;&lt;iframe sandbox=&quot;allow-scripts&quot; security=&quot;restricted&quot; src=&quot;https:\/\/hackingdoc.com\/en\/embed\/#?secret=pB9YpxUGVS&quot; width=&quot;500&quot; height=&quot;350&quot; title=&quot;&#8220;Ciberseguridad&#8221; &#8212; hackingdoc.com&quot; data-secret=&quot;pB9YpxUGVS&quot; frameborder=&quot;0&quot; marginwidth=&quot;0&quot; marginheight=&quot;0&quot; scrolling=&quot;no&quot; class=&quot;wp-embedded-content&quot;&gt;&lt;\/iframe&gt;&lt;script type=&quot;text\/javascript&quot;&gt;\n\/* &lt;![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){&quot;use strict&quot;;l.querySelector&amp;&amp;d.addEventListener&amp;&amp;&quot;undefined&quot;!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll(&#039;iframe[data-secret=&quot;&#039;+t.secret+&#039;&quot;]&#039;),o=l.querySelectorAll(&#039;blockquote[data-secret=&quot;&#039;+t.secret+&#039;&quot;]&#039;),c=new RegExp(&quot;^https?:$&quot;,&quot;i&quot;),i=0;i&lt;o.length;i++)o[i].style.display=&quot;none&quot;;for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute(&quot;style&quot;),&quot;height&quot;===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):&quot;link&quot;===t.message&amp;&amp;(r=new URL(s.getAttribute(&quot;src&quot;)),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener(&quot;message&quot;,d.wp.receiveEmbedMessage,!1),l.addEventListener(&quot;DOMContentLoaded&quot;,function(){for(var e,t,s=l.querySelectorAll(&quot;iframe.wp-embedded-content&quot;),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute(&quot;data-secret&quot;))||(t=Math.random().toString(36).substring(2,12),e.src+=&quot;#?secret=&quot;+t,e.setAttribute(&quot;data-secret&quot;,t)),e.contentWindow.postMessage({message:&quot;ready&quot;,secret:t},&quot;*&quot;)},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/hackingdoc.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n&lt;\/script&gt;\n'\n\t\t\t\t\t\t\t\t   title=\"Embed Code\"\n\t\t\t\t\t\t\t\t   class=\"input-embed input-embed-135\" readonly\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<button class=\"copy-embed copy-embed-135\" title=\"Copy Embed Code\" aria-label=\"Copy Embed Code\"><\/button>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\n\t\t\t<div class=\"playlist__wrapper\" data-page=\"1\">\n\t\t\t<div class=\"loader\"><\/div>\n\t\t\t<ul class=\"playlist__items\">\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item active\"\n\t\t\t\t\t\tdata-episode=\"135\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-7-150x150.jpg\" title=\"\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\" alt=\"\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11<\/h2>\n\t\t\t\t\t\t\t<p>Nov 18, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-135\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94356022\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-13%2Fd71d7f2f-642e-49c6-dfca-4991998ce2c2.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"138\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-8-150x150.jpg\" title=\"\ud83c\udfa7 Video Educaci\u00f3n, Tecnolog\u00eda y Seguridad de la Informaci\u00f3n con Gerardo Porteny BackalTEDx -14\" alt=\"\ud83c\udfa7 Video Educaci\u00f3n, Tecnolog\u00eda y Seguridad de la Informaci\u00f3n con Gerardo Porteny BackalTEDx -14\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83c\udfa7 Video Educaci\u00f3n, Tecnolog\u00eda y Seguridad de la Informaci\u00f3n con Gerardo Porteny BackalTEDx -14<\/h2>\n\t\t\t\t\t\t\t<p>Jan 6, 2025 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-138\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/96603749\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2025-0-4%2F392521923-44100-2-6d1fa29cdfc9e.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"140\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-9-150x150.jpg\" title=\"\ud83d\udea8Hacker de Dedo Gordo: Entrevista con un Pentester \ud83d\ude80\ud83d\uddb1\ufe0f -13\" alt=\"\ud83d\udea8Hacker de Dedo Gordo: Entrevista con un Pentester \ud83d\ude80\ud83d\uddb1\ufe0f -13\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udea8Hacker de Dedo Gordo: Entrevista con un Pentester \ud83d\ude80\ud83d\uddb1\ufe0f -13<\/h2>\n\t\t\t\t\t\t\t<p>Dec 2, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-140\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94518476\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-16%2F389933358-44100-2-09eacc40e54f5.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"142\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-7-150x150.jpg\" title=\"\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12\" alt=\"\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12<\/h2>\n\t\t\t\t\t\t\t<p>Nov 25, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-142\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94856543\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-23%2F3ea6e6c7-2703-39f1-5652-cae6bfcb81b7.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"144\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-11-150x150.jpg\" title=\"\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12\" alt=\"\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12<\/h2>\n\t\t\t\t\t\t\t<p>Nov 25, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-144\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94856543\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-23%2F3ea6e6c7-2703-39f1-5652-cae6bfcb81b7.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"146\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-12-150x150.jpg\" title=\"\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\" alt=\"\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11<\/h2>\n\t\t\t\t\t\t\t<p>Nov 18, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-146\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94356022\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-13%2Fd71d7f2f-642e-49c6-dfca-4991998ce2c2.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"148\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-13-150x150.jpg\" title=\"\ud83d\udd12Nube Segura: Protegiendo tu Futuro \u2601\ufe0f\ud83d\udd12 - 10\" alt=\"\ud83d\udd12Nube Segura: Protegiendo tu Futuro \u2601\ufe0f\ud83d\udd12 - 10\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udd12Nube Segura: Protegiendo tu Futuro \u2601\ufe0f\ud83d\udd12 - 10<\/h2>\n\t\t\t\t\t\t\t<p>Nov 11, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-148\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/93235233\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-9-18%2F4f339f03-d9e1-46cb-7da8-c3045654707c.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"150\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-14-150x150.jpg\" title=\"\ud83d\udea8 Ciberseguridad en el Metaverso: Protegiendo Nuestro Futuro Digital \ud83d\udea8\ud83d\udd27 - 09\" alt=\"\ud83d\udea8 Ciberseguridad en el Metaverso: Protegiendo Nuestro Futuro Digital \ud83d\udea8\ud83d\udd27 - 09\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udea8 Ciberseguridad en el Metaverso: Protegiendo Nuestro Futuro Digital \ud83d\udea8\ud83d\udd27 - 09<\/h2>\n\t\t\t\t\t\t\t<p>Nov 3, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-150\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/93823583\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-1%2Fee7cbcbf-40eb-02e8-fb48-23404edf6853.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"152\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-15-150x150.jpg\" title=\"\ud83d\udee1\ufe0fEl Poder del Sandboxing en Ciberseguridad \ud83d\udee1\ufe0f\ud83d\udcbb -08\" alt=\"\ud83d\udee1\ufe0fEl Poder del Sandboxing en Ciberseguridad \ud83d\udee1\ufe0f\ud83d\udcbb -08\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udee1\ufe0fEl Poder del Sandboxing en Ciberseguridad \ud83d\udee1\ufe0f\ud83d\udcbb -08<\/h2>\n\t\t\t\t\t\t\t<p>Oct 28, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-152\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/93247977\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-9-19%2Fe5577b3e-303d-05a0-a040-acc7ad4675ee.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"154\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-16-150x150.jpg\" title=\"\ud83c\udf2a\ufe0fCrisis y Conexiones: Liderazgo emp\u00e1tico en la ciberseguridad \u2764\ufe0f\ud83d\udd10 -07\" alt=\"\ud83c\udf2a\ufe0fCrisis y Conexiones: Liderazgo emp\u00e1tico en la ciberseguridad \u2764\ufe0f\ud83d\udd10 -07\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83c\udf2a\ufe0fCrisis y Conexiones: Liderazgo emp\u00e1tico en la ciberseguridad \u2764\ufe0f\ud83d\udd10 -07<\/h2>\n\t\t\t\t\t\t\t<p>Oct 21, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-154\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/93291345\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-9-20%2Fe01fcf5e-ecce-35ff-76b7-5105c8fa8c4a.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\n\n\t<\/div>\n[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]  <iframe loading=\"lazy\" src=\"https:\/\/threatmap.fortiguard.com\/\"scrolling=\"no\" width=\"100%\" height=\"600\" frameborder=\"0\" style=\"border:0\" allowfullscreen><\/iframe><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios<div id=\"3822386005\" class=\"castos-player light-mode \" tabindex=\"0\" data-episode=\"135\" data-player_id=\"3822386005\">\n\t<div class=\"player\">\n\t\t<div class=\"player__main\">\n\t\t\t<div class=\"player__artwork player__artwork-135\">\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-7-150x150.jpg\"\n\t\t\t\t\t alt=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\"\n\t\t\t\t\t title=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\n\t\t\t<\/div>\n\t\t\t<div class=\"player__body\">\n\t\t\t\t<div class=\"currently-playing\">\n\t\t\t\t\t<div class=\"show player__podcast-title\">\n\t\t\t\t\t\t\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"episode-title player__episode-title\">\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"play-progress\">\n\t\t\t\t\t<div class=\"play-pause-controls\">\n\t\t\t\t\t\t<button title=\"Play\" aria-label=\"Play Episode\" aria-pressed=\"false\" class=\"play-btn\">\n\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Play Episode<\/span>\n\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t<button title=\"Pause\" aria-label=\"Pause Episode\" aria-pressed=\"false\" class=\"pause-btn hide\">\n\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Pause Episode<\/span>\n\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/plugins\/seriously-simple-podcasting\/assets\/css\/images\/player\/images\/icon-loader.svg\" alt=\"Loading\" class=\"ssp-loader hide\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-135\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94356022\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-13%2Fd71d7f2f-642e-49c6-dfca-4991998ce2c2.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t\t<div class=\"ssp-progress\" role=\"progressbar\" title=\"Seek\" aria-valuenow=\"0\" aria-valuemin=\"0\" aria-valuemax=\"0\">\n\t\t\t\t\t\t\t<span class=\"progress__filled\"><\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"ssp-playback playback\">\n\t\t\t\t\t\t\t<div class=\"playback__controls\">\n\t\t\t\t\t\t\t\t<button class=\"player-btn player-btn__volume\" title=\"Mute\/Unmute\">\n\t\t\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Mute\/Unmute Episode<\/span>\n\t\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t\t<button data-skip=\"-10\" class=\"player-btn player-btn__rwd\" title=\"Rewind 10 seconds\">\n\t\t\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Rewind 10 Seconds<\/span>\n\t\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t\t<button data-speed=\"1\" class=\"player-btn player-btn__speed\" title=\"Playback Speed\" aria-label=\"Playback Speed\">1x<\/button>\n\t\t\t\t\t\t\t\t<button data-skip=\"30\" class=\"player-btn player-btn__fwd\" title=\"Fast Forward 30 seconds\">\n\t\t\t\t\t\t\t\t\t<span class=\"screen-reader-text\">Fast Forward 30 seconds<\/span>\n\t\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"playback__timers\">\n\t\t\t\t\t\t\t\t<time class=\"ssp-timer\">00:00<\/time>\n\t\t\t\t\t\t\t\t<span>\/<\/span>\n\t\t\t\t\t\t\t\t<!-- We need actual duration here from the server -->\n\t\t\t\t\t\t\t\t<time class=\"ssp-duration\" datetime=\"PT0H0M0S\"><\/time>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<nav class=\"player-panels-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"subscribe-btn\" id=\"subscribe-btn-135\" title=\"Subscribe\">Subscribe<\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"share-btn\" id=\"share-btn-135\" title=\"Share\">Share<\/button>\n\t\t\t\t\t\t\t\t\t\t\t<\/nav>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"player-panels player-panels-135\">\n\t\t\t\t\t\t\t<div class=\"subscribe player-panel subscribe-135\">\n\t\t\t\t\t<div class=\"close-btn close-btn-135\">\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"panel__inner\">\n\t\t\t\t\t\t<div class=\"subscribe-icons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/open.spotify.com\/show\/3xMJf78MkSPCv6zEBtqH0Z\" target=\"_blank\" rel=\"noopener noreferrer\"\n\t\t\t\t\t\t\t\t\t   class=\"spotify\"\n\t\t\t\t\t\t\t\t\t   title=\"Subscribe on  Spotify\">\n\t\t\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t\t\t\tSpotify\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"player-panel-row\" aria-label=\"RSS Feed URL\">\n\t\t\t\t\t\t\t<div class=\"title\">RSS Feed<\/div>\n\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<input value=\"https:\/\/hackingdoc.com\/en\/feed\/podcast\/hackingdoc-com\" class=\"input-rss input-rss-135\" title=\"RSS Feed URL\" readonly \/>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<button class=\"copy-rss copy-rss-135\" title=\"Copy RSS Feed URL\" aria-label=\"Copy RSS Feed URL\"><\/button>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"share share-135 player-panel\">\n\t\t\t\t\t<div class=\"close-btn close-btn-135\">\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"player-panel-row\">\n\t\t\t\t\t\t<div class=\"title\">\n\t\t\t\t\t\t\tShare\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"icons-holder\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10&t=\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\"\n\t\t\t\t\t\t\t   target=\"_blank\" rel=\"noopener noreferrer\" class=\"share-icon facebook\" title=\"Share on Facebook\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?text=https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10&url=\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\"\n\t\t\t\t\t\t\t   target=\"_blank\" rel=\"noopener noreferrer\" class=\"share-icon twitter\" title=\"Share on Twitter\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<a href=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94356022\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-13%2Fd71d7f2f-642e-49c6-dfca-4991998ce2c2.mp3\"\n\t\t\t\t\t\t\t   target=\"_blank\" rel=\"noopener noreferrer\" class=\"share-icon download\" title=\"Download\" download>\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"player-panel-row\">\n\t\t\t\t\t\t<div class=\"title\">\n\t\t\t\t\t\t\tLink\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t<input value=\"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10\" class=\"input-link input-link-135\" title=\"Episode URL\" readonly \/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<button class=\"copy-link copy-link-135\" title=\"Copy Episode URL\" aria-label=\"Copy Episode URL\" readonly=\"\"><\/button>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"player-panel-row\">\n\t\t\t\t\t\t<div class=\"title\">\n\t\t\t\t\t\t\tEmbed\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div style=\"height: 10px;\">\n\t\t\t\t\t\t\t<input type=\"text\" value='&lt;blockquote class=&quot;wp-embedded-content&quot; data-secret=&quot;C4j42mU9Uq&quot;&gt;&lt;a href=&quot;https:\/\/hackingdoc.com\/en\/&quot;&gt;Ciberseguridad&lt;\/a&gt;&lt;\/blockquote&gt;&lt;iframe sandbox=&quot;allow-scripts&quot; security=&quot;restricted&quot; src=&quot;https:\/\/hackingdoc.com\/en\/embed\/#?secret=C4j42mU9Uq&quot; width=&quot;500&quot; height=&quot;350&quot; title=&quot;&#8220;Ciberseguridad&#8221; &#8212; hackingdoc.com&quot; data-secret=&quot;C4j42mU9Uq&quot; frameborder=&quot;0&quot; marginwidth=&quot;0&quot; marginheight=&quot;0&quot; scrolling=&quot;no&quot; class=&quot;wp-embedded-content&quot;&gt;&lt;\/iframe&gt;&lt;script type=&quot;text\/javascript&quot;&gt;\n\/* &lt;![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){&quot;use strict&quot;;l.querySelector&amp;&amp;d.addEventListener&amp;&amp;&quot;undefined&quot;!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll(&#039;iframe[data-secret=&quot;&#039;+t.secret+&#039;&quot;]&#039;),o=l.querySelectorAll(&#039;blockquote[data-secret=&quot;&#039;+t.secret+&#039;&quot;]&#039;),c=new RegExp(&quot;^https?:$&quot;,&quot;i&quot;),i=0;i&lt;o.length;i++)o[i].style.display=&quot;none&quot;;for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute(&quot;style&quot;),&quot;height&quot;===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):&quot;link&quot;===t.message&amp;&amp;(r=new URL(s.getAttribute(&quot;src&quot;)),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener(&quot;message&quot;,d.wp.receiveEmbedMessage,!1),l.addEventListener(&quot;DOMContentLoaded&quot;,function(){for(var e,t,s=l.querySelectorAll(&quot;iframe.wp-embedded-content&quot;),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute(&quot;data-secret&quot;))||(t=Math.random().toString(36).substring(2,12),e.src+=&quot;#?secret=&quot;+t,e.setAttribute(&quot;data-secret&quot;,t)),e.contentWindow.postMessage({message:&quot;ready&quot;,secret:t},&quot;*&quot;)},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/hackingdoc.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n&lt;\/script&gt;\n'\n\t\t\t\t\t\t\t\t   title=\"Embed Code\"\n\t\t\t\t\t\t\t\t   class=\"input-embed input-embed-135\" readonly\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<button class=\"copy-embed copy-embed-135\" title=\"Copy Embed Code\" aria-label=\"Copy Embed Code\"><\/button>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\n\t\t\t<div class=\"playlist__wrapper\" data-page=\"1\">\n\t\t\t<div class=\"loader\"><\/div>\n\t\t\t<ul class=\"playlist__items\">\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item active\"\n\t\t\t\t\t\tdata-episode=\"135\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-7-150x150.jpg\" title=\"\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\" alt=\"\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11<\/h2>\n\t\t\t\t\t\t\t<p>Nov 18, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-135\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94356022\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-13%2Fd71d7f2f-642e-49c6-dfca-4991998ce2c2.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"138\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-8-150x150.jpg\" title=\"\ud83c\udfa7 Video Educaci\u00f3n, Tecnolog\u00eda y Seguridad de la Informaci\u00f3n con Gerardo Porteny BackalTEDx -14\" alt=\"\ud83c\udfa7 Video Educaci\u00f3n, Tecnolog\u00eda y Seguridad de la Informaci\u00f3n con Gerardo Porteny BackalTEDx -14\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83c\udfa7 Video Educaci\u00f3n, Tecnolog\u00eda y Seguridad de la Informaci\u00f3n con Gerardo Porteny BackalTEDx -14<\/h2>\n\t\t\t\t\t\t\t<p>Jan 6, 2025 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-138\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/96603749\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2025-0-4%2F392521923-44100-2-6d1fa29cdfc9e.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"140\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-9-150x150.jpg\" title=\"\ud83d\udea8Hacker de Dedo Gordo: Entrevista con un Pentester \ud83d\ude80\ud83d\uddb1\ufe0f -13\" alt=\"\ud83d\udea8Hacker de Dedo Gordo: Entrevista con un Pentester \ud83d\ude80\ud83d\uddb1\ufe0f -13\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udea8Hacker de Dedo Gordo: Entrevista con un Pentester \ud83d\ude80\ud83d\uddb1\ufe0f -13<\/h2>\n\t\t\t\t\t\t\t<p>Dec 2, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-140\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94518476\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-16%2F389933358-44100-2-09eacc40e54f5.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"142\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-7-150x150.jpg\" title=\"\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12\" alt=\"\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12<\/h2>\n\t\t\t\t\t\t\t<p>Nov 25, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-142\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94856543\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-23%2F3ea6e6c7-2703-39f1-5652-cae6bfcb81b7.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"144\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-11-150x150.jpg\" title=\"\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12\" alt=\"\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Zero Day: La Amenaza Invisible de la Ciberseguridad - 12<\/h2>\n\t\t\t\t\t\t\t<p>Nov 25, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-144\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94856543\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-23%2F3ea6e6c7-2703-39f1-5652-cae6bfcb81b7.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"146\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-12-150x150.jpg\" title=\"\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\" alt=\"\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83c\udfa7 Stop Violencia de G\u00e9nero Digital por Encarni Iglesias Pereira \ud83c\udfa4 -11<\/h2>\n\t\t\t\t\t\t\t<p>Nov 18, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-146\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/94356022\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-13%2Fd71d7f2f-642e-49c6-dfca-4991998ce2c2.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"148\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-13-150x150.jpg\" title=\"\ud83d\udd12Nube Segura: Protegiendo tu Futuro \u2601\ufe0f\ud83d\udd12 - 10\" alt=\"\ud83d\udd12Nube Segura: Protegiendo tu Futuro \u2601\ufe0f\ud83d\udd12 - 10\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udd12Nube Segura: Protegiendo tu Futuro \u2601\ufe0f\ud83d\udd12 - 10<\/h2>\n\t\t\t\t\t\t\t<p>Nov 11, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-148\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/93235233\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-9-18%2F4f339f03-d9e1-46cb-7da8-c3045654707c.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"150\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-14-150x150.jpg\" title=\"\ud83d\udea8 Ciberseguridad en el Metaverso: Protegiendo Nuestro Futuro Digital \ud83d\udea8\ud83d\udd27 - 09\" alt=\"\ud83d\udea8 Ciberseguridad en el Metaverso: Protegiendo Nuestro Futuro Digital \ud83d\udea8\ud83d\udd27 - 09\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udea8 Ciberseguridad en el Metaverso: Protegiendo Nuestro Futuro Digital \ud83d\udea8\ud83d\udd27 - 09<\/h2>\n\t\t\t\t\t\t\t<p>Nov 3, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-150\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/93823583\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-10-1%2Fee7cbcbf-40eb-02e8-fb48-23404edf6853.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"152\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-15-150x150.jpg\" title=\"\ud83d\udee1\ufe0fEl Poder del Sandboxing en Ciberseguridad \ud83d\udee1\ufe0f\ud83d\udcbb -08\" alt=\"\ud83d\udee1\ufe0fEl Poder del Sandboxing en Ciberseguridad \ud83d\udee1\ufe0f\ud83d\udcbb -08\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83d\udee1\ufe0fEl Poder del Sandboxing en Ciberseguridad \ud83d\udee1\ufe0f\ud83d\udcbb -08<\/h2>\n\t\t\t\t\t\t\t<p>Oct 28, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-152\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/93247977\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-9-19%2Fe5577b3e-303d-05a0-a040-acc7ad4675ee.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<li class=\"playlist__item\"\n\t\t\t\t\t\tdata-episode=\"154\">\n\t\t\t\t\t\t<div class=\"playlist__item__cover\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/40511112-1723320777865-2066993dc271f-16-150x150.jpg\" title=\"\ud83c\udf2a\ufe0fCrisis y Conexiones: Liderazgo emp\u00e1tico en la ciberseguridad \u2764\ufe0f\ud83d\udd10 -07\" alt=\"\ud83c\udf2a\ufe0fCrisis y Conexiones: Liderazgo emp\u00e1tico en la ciberseguridad \u2764\ufe0f\ud83d\udd10 -07\"\/>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"playlist__item__details\">\n\t\t\t\t\t\t\t<h2 class=\"playlist__episode-title\" data-podcast=\"\ud83c\udf1f\ud83d\uded1Hackingdoc: Seguridad inform\u00e1tica simplificada. Amenazas, herramientas y recomendaciones clave\">\ud83c\udf2a\ufe0fCrisis y Conexiones: Liderazgo emp\u00e1tico en la ciberseguridad \u2764\ufe0f\ud83d\udd10 -07<\/h2>\n\t\t\t\t\t\t\t<p>Oct 21, 2024 \u2022 <\/p>\n\t\t\t\t\t\t\t<p class=\"playlist__episode-description\">LA SEGURIDAD NO ES UN JUEGO, TODOS SOMOS RESPONSABLES.Episodios[podcast_playlist]<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<audio preload=\"none\" class=\"clip clip-154\">\n\t\t\t\t\t\t\t<source src=\"https:\/\/anchor.fm\/s\/f20fa3a0\/podcast\/play\/93291345\/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2024-9-20%2Fe01fcf5e-ecce-35ff-76b7-5105c8fa8c4a.mp3\">\n\t\t\t\t\t\t<\/audio>\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\n\n\t<\/div>\n<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":16,"href":"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/pages\/10\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/hackingdoc.com\/en\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}