{"id":202870,"date":"2026-04-13T08:28:32","date_gmt":"2026-04-13T07:28:32","guid":{"rendered":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/"},"modified":"2026-04-13T08:28:32","modified_gmt":"2026-04-13T07:28:32","slug":"un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales","status":"publish","type":"post","link":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/","title":{"rendered":"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales"},"content":{"rendered":"<p>La tecnolog\u00eda se convierte en una parte cada vez m\u00e1s intr\u00ednseca de lo cotidiano. La expansi\u00f3n de redes corporativas, la interconexi\u00f3n de infraestructuras y la digitalizaci\u00f3n de servicios facilitan el flujo de comunicaci\u00f3n, pero tambi\u00e9n presentan una amenaza ante la constante exposici\u00f3n en el ciberespacio.\u00a0<\/p>\n<p>La automatizaci\u00f3n de los procesos de detecci\u00f3n y respuesta de dichas amenazas se convierte en un elemento clave para reforzar la resiliencia de redes empresariales, infraestructuras industriales y servicios esenciales.<\/p>\n<p>Un grupo de investigadores de Redes y Servicios de Telecomunicaci\u00f3n en Internet de la Universidad Polit\u00e9cnica de Madrid ha elaborado un modelo para mejorar la detecci\u00f3n y mitigaci\u00f3n de ciberataques.\u00a0<\/p>\n<p>                        <a href=\"https:\/\/www.agenciasinc.es\/Opinion\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\"><br \/>\n                            <img decoding=\"async\" src=\"https:\/\/cdn.agenciasinc.es\/var\/ezwebin_site\/storage\/images\/opinion\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\/12325606-1-esl-MX\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg\" alt=\"Claves de ciberseguridad y resiliencia empresarial para afrontar un ciberataque\" title=\"Claves de ciberseguridad y resiliencia empresarial para afrontar un ciberataque\" class=\"small_fotoderecha_img\" loading=\"lazy\" \/><br \/>\n                        <\/a><\/p>\n<p>                    <a href=\"https:\/\/www.agenciasinc.es\/Opinion\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\" class=\"small_fotoderecha_titulo\"><\/a><\/p>\n<h3 class=\"small_fotoderecha_titulo\">Claves de ciberseguridad y resiliencia empresarial para afrontar un ciberataque<\/h3>\n<p>                    <\/p>\n<p>                                Jes\u00fas Barrena Mart\u00ednez y Nikol Alejandra Pe\u00f1a Vanegas<\/p>\n<p>Con la inteligencia artificial en el centro, el modelo es capaz de identificar patrones asociados a comportamientos maliciosos, relacionarlos con t\u00e9cnicas concretas de ataque y sugerir respuestas adecuadas para cada caso individual.<\/p>\n<p><a><\/a><\/p>\n<h2>Comportamiento atacante<\/h2>\n<p>La investigaci\u00f3n combina aprendizaje autom\u00e1tico con el marco de referencia MITRE ATT&amp;CK, que consiste en una base de conocimiento internacional que organiza las t\u00e1cticas, t\u00e9cnicas y procedimientos que se emplean en casos de ciberataques.<\/p>\n<p>El modelo que propone el equipo est\u00e1 compuesto por un algoritmo de aprendizaje autom\u00e1tico entrenado para identificar t\u00e9cnicas en incidentes de registro de tr\u00e1fico. Su integraci\u00f3n con sistemas de toma de decisiones permite ejecutar una respuesta individualizada para el incidente detectado seg\u00fan sus caracter\u00edsticas.<\/p>\n<p>Analizar el comportamiento del atacante permite ofrecer una respuesta m\u00e1s r\u00e1pida y precisa<\/p>\n<p>Los sistemas tradicionales de protecci\u00f3n frente a ataques inform\u00e1ticos se basan en firmas y reglas est\u00e1ticas, que a veces son menos eficaces, sobre todo cuando se trata de amenazas nuevas y avanzadas.<\/p>\n<p>El primer paso que da el nuevo modelo, en cambio, es analizar el comportamiento del atacante. Esta etapa permite mejorar la caracterizaci\u00f3n de los incidentes y facilita una respuesta m\u00e1s r\u00e1pida y precisa, de tal forma que reduce el impacto potencial sobre los sistemas afectados.<\/p>\n<p><a><\/a><\/p>\n<h2>M\u00e1s all\u00e1 del aspecto tecnol\u00f3gico<\/h2>\n<p>El nuevo modelo tambi\u00e9n tiene impacto social. \u201cLas implicaciones sociales de esta investigaci\u00f3n son relevantes, ya que soluciones basadas en inteligencia artificial contribuyen a mejorar la protecci\u00f3n de datos, servicios esenciales y sistemas estrat\u00e9gicos\u201d, destaca Carmen S\u00e1nchez Zas, investigadora que ha formado parte del equipo de trabajo.<\/p>\n<p>La inteligencia artificial ocupa un lugar determinante en el desarrollo de estrategias de defensa adaptativas y proactivas en un ecosistema digital de complejidad creciente.<\/p>\n<p>Referencia:<\/p>\n<p>Carmen S\u00e1nchez-Zas et al. \u00abDynamic characterisation of cyberattacks based on the MITRE ATT&amp;CK framework applied to the optimisation of a mitigation selection process\u00bb.\u00a0<a href=\"https:\/\/doi.org\/10.1016\/j.future.2025.108272\" target=\"_blank\">Future Generation Computer System<\/a>s.\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>La tecnolog\u00eda se convierte en una parte cada vez m\u00e1s intr\u00ednseca de lo cotidiano. La expansi\u00f3n de redes corporativas, la interconexi\u00f3n de infraestructuras y la digitalizaci\u00f3n de servicios facilitan el flujo de comunicaci\u00f3n, pero tambi\u00e9n presentan una amenaza ante la constante exposici\u00f3n en el ciberespacio.\u00a0 La automatizaci\u00f3n de los procesos de detecci\u00f3n y respuesta de [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-202870","post","type-post","status-publish","format-standard","hentry","category-noticias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales - bip4ex<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales\" \/>\n<meta property=\"og:description\" content=\"La tecnolog\u00eda se convierte en una parte cada vez m\u00e1s intr\u00ednseca de lo cotidiano. La expansi\u00f3n de redes corporativas, la interconexi\u00f3n de infraestructuras y la digitalizaci\u00f3n de servicios facilitan el flujo de comunicaci\u00f3n, pero tambi\u00e9n presentan una amenaza ante la constante exposici\u00f3n en el ciberespacio.\u00a0 La automatizaci\u00f3n de los procesos de detecci\u00f3n y respuesta de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/\" \/>\n<meta property=\"og:site_name\" content=\"bip4ex\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-13T07:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.agenciasinc.es\/var\/ezwebin_site\/storage\/images\/opinion\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\/12325606-1-esl-MX\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg\" \/>\n<meta name=\"author\" content=\"Luis Miguel Mej\u00edas Ramos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luis Miguel Mej\u00edas Ramos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/\"},\"author\":{\"name\":\"Luis Miguel Mej\u00edas Ramos\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#\\\/schema\\\/person\\\/3767b0619d59a11570372c821f8619ca\"},\"headline\":\"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales\",\"datePublished\":\"2026-04-13T07:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/\"},\"wordCount\":489,\"publisher\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.agenciasinc.es\\\/var\\\/ezwebin_site\\\/storage\\\/images\\\/opinion\\\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\\\/12325606-1-esl-MX\\\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg\",\"articleSection\":[\"Noticias\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/\",\"url\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/\",\"name\":\"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales - bip4ex\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.agenciasinc.es\\\/var\\\/ezwebin_site\\\/storage\\\/images\\\/opinion\\\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\\\/12325606-1-esl-MX\\\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg\",\"datePublished\":\"2026-04-13T07:28:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn.agenciasinc.es\\\/var\\\/ezwebin_site\\\/storage\\\/images\\\/opinion\\\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\\\/12325606-1-esl-MX\\\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn.agenciasinc.es\\\/var\\\/ezwebin_site\\\/storage\\\/images\\\/opinion\\\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\\\/12325606-1-esl-MX\\\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#website\",\"url\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/\",\"name\":\"bip4ex\",\"description\":\"Vigilancia Tecnol\u00f3gica\",\"publisher\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#organization\",\"name\":\"Helloproject.es\",\"url\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/bip4ex.png\",\"contentUrl\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/bip4ex.png\",\"width\":322,\"height\":365,\"caption\":\"Helloproject.es\"},\"image\":{\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/#\\\/schema\\\/person\\\/3767b0619d59a11570372c821f8619ca\",\"name\":\"Luis Miguel Mej\u00edas Ramos\",\"url\":\"https:\\\/\\\/helloproject.es\\\/vigilancia\\\/author\\\/luismi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales - bip4ex","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/","og_locale":"es_ES","og_type":"article","og_title":"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales","og_description":"La tecnolog\u00eda se convierte en una parte cada vez m\u00e1s intr\u00ednseca de lo cotidiano. La expansi\u00f3n de redes corporativas, la interconexi\u00f3n de infraestructuras y la digitalizaci\u00f3n de servicios facilitan el flujo de comunicaci\u00f3n, pero tambi\u00e9n presentan una amenaza ante la constante exposici\u00f3n en el ciberespacio.\u00a0 La automatizaci\u00f3n de los procesos de detecci\u00f3n y respuesta de [&hellip;]","og_url":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/","og_site_name":"bip4ex","article_published_time":"2026-04-13T07:28:32+00:00","og_image":[{"url":"https:\/\/cdn.agenciasinc.es\/var\/ezwebin_site\/storage\/images\/opinion\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\/12325606-1-esl-MX\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg","type":"","width":"","height":""}],"author":"Luis Miguel Mej\u00edas Ramos","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Luis Miguel Mej\u00edas Ramos","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/#article","isPartOf":{"@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/"},"author":{"name":"Luis Miguel Mej\u00edas Ramos","@id":"https:\/\/helloproject.es\/vigilancia\/#\/schema\/person\/3767b0619d59a11570372c821f8619ca"},"headline":"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales","datePublished":"2026-04-13T07:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/"},"wordCount":489,"publisher":{"@id":"https:\/\/helloproject.es\/vigilancia\/#organization"},"image":{"@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.agenciasinc.es\/var\/ezwebin_site\/storage\/images\/opinion\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\/12325606-1-esl-MX\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg","articleSection":["Noticias"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/","url":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/","name":"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales - bip4ex","isPartOf":{"@id":"https:\/\/helloproject.es\/vigilancia\/#website"},"primaryImageOfPage":{"@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/#primaryimage"},"image":{"@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.agenciasinc.es\/var\/ezwebin_site\/storage\/images\/opinion\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\/12325606-1-esl-MX\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg","datePublished":"2026-04-13T07:28:32+00:00","breadcrumb":{"@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/#primaryimage","url":"https:\/\/cdn.agenciasinc.es\/var\/ezwebin_site\/storage\/images\/opinion\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\/12325606-1-esl-MX\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg","contentUrl":"https:\/\/cdn.agenciasinc.es\/var\/ezwebin_site\/storage\/images\/opinion\/claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque\/12325606-1-esl-MX\/Claves-de-ciberseguridad-y-resiliencia-empresarial-para-afrontar-un-ciberataque.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/helloproject.es\/vigilancia\/un-nuevo-modelo-basado-en-ia-aprende-a-neutralizar-amenazas-digitales\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/helloproject.es\/vigilancia\/"},{"@type":"ListItem","position":2,"name":"Un nuevo modelo basado en IA aprende a neutralizar amenazas digitales"}]},{"@type":"WebSite","@id":"https:\/\/helloproject.es\/vigilancia\/#website","url":"https:\/\/helloproject.es\/vigilancia\/","name":"bip4ex","description":"Vigilancia Tecnol\u00f3gica","publisher":{"@id":"https:\/\/helloproject.es\/vigilancia\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/helloproject.es\/vigilancia\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/helloproject.es\/vigilancia\/#organization","name":"Helloproject.es","url":"https:\/\/helloproject.es\/vigilancia\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/helloproject.es\/vigilancia\/#\/schema\/logo\/image\/","url":"https:\/\/helloproject.es\/vigilancia\/wp-content\/uploads\/2023\/07\/bip4ex.png","contentUrl":"https:\/\/helloproject.es\/vigilancia\/wp-content\/uploads\/2023\/07\/bip4ex.png","width":322,"height":365,"caption":"Helloproject.es"},"image":{"@id":"https:\/\/helloproject.es\/vigilancia\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/helloproject.es\/vigilancia\/#\/schema\/person\/3767b0619d59a11570372c821f8619ca","name":"Luis Miguel Mej\u00edas Ramos","url":"https:\/\/helloproject.es\/vigilancia\/author\/luismi\/"}]}},"_links":{"self":[{"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/posts\/202870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/comments?post=202870"}],"version-history":[{"count":0,"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/posts\/202870\/revisions"}],"wp:attachment":[{"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/media?parent=202870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/categories?post=202870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/helloproject.es\/vigilancia\/wp-json\/wp\/v2\/tags?post=202870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}