{"id":440,"date":"2018-01-21T10:26:37","date_gmt":"2018-01-21T10:26:37","guid":{"rendered":"http:\/\/uctechpro.unican.es\/2018\/?p=440"},"modified":"2018-02-22T12:30:06","modified_gmt":"2018-02-22T12:30:06","slug":"programacion-segura","status":"publish","type":"post","link":"https:\/\/uctechpro.unican.es\/2018\/programacion-segura\/","title":{"rendered":"Programaci\u00f3n segura"},"content":{"rendered":"
En la actualidad, la mayor\u00eda de ataques cibern\u00e9ticos se producen explotando vulnerabilidades en la capa de aplicaci\u00f3n, por lo que el desarrollo seguro de aplicaciones se convierte en la forma m\u00e1s \u00f3ptima de proteger nuestro software.<\/p>\n
En esta charla se mostrar\u00e1n un conjunto de principios, buenas pr\u00e1cticas y metodolog\u00edas para el ciclo de vida del desarrollo del software, que nos permitir\u00e1n disminuir el coste en tiempo, dinero y esfuerzo en solucionar un problema de seguridad as\u00ed como reducir significativamente las posibilidades de que un atacante pueda encontrar y explotar una vulnerabilidad en nuestra aplicaci\u00f3n.<\/p>\n","protected":false},"excerpt":{"rendered":"
En la actualidad, la mayor\u00eda de ataques cibern\u00e9ticos se producen explotando vulnerabilidades en la capa de aplicaci\u00f3n, por lo que el desarrollo seguro de aplicaciones se convierte en la formaLeer m\u00e1s sobre Programaci\u00f3n segura<\/span>[…]<\/a><\/p>\n","protected":false},"author":1,"featured_media":441,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-and-hacking"],"_links":{"self":[{"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/posts\/440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/comments?post=440"}],"version-history":[{"count":1,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/posts\/440\/revisions"}],"predecessor-version":[{"id":442,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/posts\/440\/revisions\/442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/media\/441"}],"wp:attachment":[{"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/media?parent=440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/categories?post=440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/tags?post=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}