{"version":"1.0","provider_name":"Fortinet","provider_url":"https:\/\/directortic.es\/fortinet","author_name":"Manuel","author_url":"https:\/\/directortic.es\/fortinet\/author\/manu\/","title":"\u00bfC\u00f3mo proteger las aplicaciones en AWS? - Fortinet","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bT501cBffb\"><a href=\"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/\">\u00bfC\u00f3mo proteger las aplicaciones en AWS?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/embed\/#?secret=bT501cBffb\" width=\"600\" height=\"338\" title=\"\u00ab\u00bfC\u00f3mo proteger las aplicaciones en AWS?\u00bb \u2014 Fortinet\" data-secret=\"bT501cBffb\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/directortic.es\/fortinet\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/dreamstime_s_83368354.jpg","thumbnail_width":800,"thumbnail_height":517,"description":"El mundo empresarial est\u00e1 repleto de falsas creencias en torno a la seguridad. Algunas se han conseguido derribar, pero otras permanecen inalterables. Una de las m\u00e1s afianzadas pasa por la innecesaria preocupaci\u00f3n de la seguridad al hospedar las aplicaciones en Amazon Web Services, cuando la realidad indica que AWS protege la infraestructura, pero el cliente [&hellip;]"}