{"id":26986,"date":"2016-05-25T22:00:00","date_gmt":"2016-05-25T20:00:00","guid":{"rendered":"https:\/\/entelgy.com\/cuadernos-seguridad-innotec-red-team\/"},"modified":"2024-11-06T21:14:33","modified_gmt":"2024-11-06T20:14:33","slug":"cuadernos-seguridad-innotec-red-team","status":"publish","type":"post","link":"https:\/\/entelgy.com\/pt-br\/actualidad-es\/cuadernos-seguridad-innotec-red-team\/","title":{"rendered":"Cuadernos de Seguridad publica el art\u00edculo de InnoTec, \u201cRed Team: Pensando como el enemigo\u201d"},"content":{"rendered":"<img fetchpriority=\"high\" decoding=\"async\" class=\" size-full wp-image-26984\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/05\/5075a6fe16a5257dfd6b352fd416953f.jpg\" alt=\"\" class=\"caption\" title=\"Cuadernos de Seguridad publica el art\u00edculo de InnoTec, \u201cRed Team: Pensando como el enemigo\u201d\" width=\"245\" height=\"363\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/05\/5075a6fe16a5257dfd6b352fd416953f.jpg 245w, https:\/\/entelgy.com\/wp-content\/uploads\/2016\/05\/5075a6fe16a5257dfd6b352fd416953f-202x300.jpg 202w\" sizes=\"(max-width: 245px) 100vw, 245px\" \/>\n<p><strong>Una vez m\u00e1s los medios especializados como <a href=\"http:\/\/www.puntoseguridad.com\/cuadernos-de-seguridad\/revista\/310\/\" target=\"_blank\" rel=\"noopener\">Cuadernos de Seguridad<\/a> cuentan con nuestros expertos para profundizar en las \u00faltimas novedades de un sector, la Seguridad, en constante evoluci\u00f3n y de total actualidad.<\/strong><\/p>\n<p><!--more--><\/p>\n<div class=\"post_wp\">\n<p><strong><em>Puedes leer el <a href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/05\/Cuadernos-de-seguridad-impresa_Red-Team_26_04_2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">art\u00edculo completo de Cuadernos de Seguridad<\/a> pinchando aqu\u00ed<\/em><\/strong><\/p>\n<p>Guillermo Gonz\u00e1lez y Eduardo Arriols, del <strong>equipo Red Team de <\/strong><a href=\"https:\/\/www.entelgy.com\/oferta-diferencial\/areas-de-especializacion\/security-risk-management-3\/?lang=es\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>InnoTec (Grupo Entelgy)<\/strong><\/a> son los autores de un interesante art\u00edculo \u00a0publicado en el n\u00famero de abril de Cuadernos de Seguridad, en el que los <strong><em>Red Team Services<\/em><\/strong> toman protagonismo.<\/p>\n<p>En el art\u00edculo, \u201c<em>Red Team: Pensando como el enemigo\u201d<\/em>, se destaca c\u00f3mo las t\u00e1cticas militares de hace miles de a\u00f1os se est\u00e1n aplicando a la Ciberseguridad hoy en d\u00eda, con el fin de dar un paso m\u00e1s en la defensa de los activos cr\u00edticos de una organizaci\u00f3n.<\/p>\n<blockquote>\n<p><em>\u201cTener una visi\u00f3n global de la situaci\u00f3n exacta de la organizaci\u00f3n en todos los frentes (digital, f\u00edsico y de las personas) y, sobre todo, conocer las t\u00e9cnicas intrusivas del atacante y su razonamiento, se vuelven indispensables para defender los activos cr\u00edticos de cualquier organizaci\u00f3n.\u201d<\/em><\/p>\n<\/blockquote>\n<p>Los <a href=\"https:\/\/www.entelgy.com\/red-team-services\/?lang=es\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Red Team<\/strong>, como el que posee <strong>InnoTec<\/strong>,<\/a> son equipos altamente cualificados que simulan intrusiones reales y controladas en una organizaci\u00f3n.<\/p>\n<blockquote>\n<p><em>\u201cEstos equipos son usados en la actualidad no solo para comprobar el nivel de seguridad existente en el \u00e1mbito digital o f\u00edsico, sino tambi\u00e9n para verificar de forma continua la efectividad de los planes de actuaci\u00f3n, las medidas defensivas implementadas o el correcto funcionamiento de las pol\u00edticas y del propio equipo de seguridad interno de la organizaci\u00f3n. <\/em><\/p>\n<p><em>De esta manera, y con una visi\u00f3n conjunta, se obtiene un mejor entendimiento de los posibles adversarios y su forma de actuaci\u00f3n, ayudando al equipo de seguridad a implementar las medidas necesarias para hacer frente a posibles ataques y adoptando una actitud proactiva frente a ataques dirigidos, algo que no puede obtenerse de ninguna otra manera.\u201d<\/em><\/p>\n<\/blockquote>\n<p><strong>\u201c<em>Con\u00f3cete a ti mismo y conoce a tu enemigo<\/em>\u201d. <\/strong> <strong><em>Sun Tzu<\/em><\/strong><strong>. El Arte de la Guerra (Siglo II a.C.)<\/strong><\/p>\n<p>\u00a0<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Una vez m\u00e1s los medios especializados como Cuadernos de Seguridad cuentan con nuestros expertos para profundizar en las \u00faltimas novedades [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26984,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,4703],"tags":[5261,5269],"class_list":["post-26986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-en-los-medios-es","tag-ciberseguridad-es","tag-seguridad-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/26986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=26986"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/26986\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media\/26984"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=26986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=26986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=26986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}