{"id":1207,"date":"2019-03-02T19:50:03","date_gmt":"2019-03-02T19:50:03","guid":{"rendered":"http:\/\/blogs.uo.edu.cu\/seginf\/?p=1207"},"modified":"2019-03-02T19:50:03","modified_gmt":"2019-03-02T19:50:03","slug":"10-principales-vulnerabilidades-en-entornos-empresariales","status":"publish","type":"post","link":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=1207","title":{"rendered":"10 principales vulnerabilidades en entornos empresariales."},"content":{"rendered":"<p class=\"rtejustify\" style=\"text-align: justify\">\n\t<img loading=\"lazy\" decoding=\"async\" alt=\"\" class=\"size-full wp-image-1209 alignleft\" height=\"200\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/03\/microsoftSoporte200x200_0.png\" style=\"margin-left: 5px;margin-right: 5px\" title=\"\" width=\"200\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/03\/microsoftSoporte200x200_0.png 200w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/03\/microsoftSoporte200x200_0-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>El descubrimiento y la revelaci&oacute;n de vulnerabilidades contin&uacute;an aumentando en volumen y ritmo. Solo en 2017, se public&oacute; diariamente un promedio de 41 nuevas vulnerabilidades, lo que equivale a 15.038 para el a&ntilde;o. Adem&aacute;s, la cantidad de vulnerabilidades reveladas recientemente en el primer semestre de 2018 mostr&oacute; un aumento del 27 % con respecto al primer semestre de 2017.&nbsp;\n<\/p>\n<p><!--more--><\/p>\n<p style=\"text-align: justify\">\n\tPara determinar las vulnerabilidades m&aacute;s generalizadas,&nbsp;<a href=\"https:\/\/es-la.tenable.com\/sites\/all\/themes\/tenablefourteen\/img\/18\/cyber-exposure\/reports\/vi-infographic-mobile.png\" target=\"_blank\">Tenable Research analiz&oacute; los datos<\/a>&nbsp;de la preponderancia de vulnerabilidades a partir de m&aacute;s de 900.000 evaluaciones de vulnerabilidades &uacute;nicas llevadas a cabo por 2100 empresas en 66 pa&iacute;ses.\n<\/p>\n<p style=\"text-align: justify\">\n\t<img loading=\"lazy\" decoding=\"async\" alt=\"\" class=\"aligncenter size-full wp-image-1208\" height=\"468\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/03\/46515292284_3048789758_o.png\" width=\"846\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/03\/46515292284_3048789758_o.png 846w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/03\/46515292284_3048789758_o-300x166.png 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/03\/46515292284_3048789758_o-768x425.png 768w\" sizes=\"auto, (max-width: 846px) 100vw, 846px\" \/>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tEn el informe se encuentra una lista de las 10 principales vulnerabilidades en entornos empresariales.&nbsp;\n<\/p>\n<ul>\n<li class=\"rtejustify\" style=\"text-align: justify\">\n\t\tEl CVSS no es una m&eacute;trica de priorizaci&oacute;n adecuada y se deber&iacute;a priorizar las vulnerabilidades en funci&oacute;n del riesgo real.\n\t<\/li>\n<li class=\"rtejustify\" style=\"text-align: justify\">\n\t\tAparecen las tendencias de vulnerabilidades en la superficie de ataque en constante expansi&oacute;n.\n\t<\/li>\n<li class=\"rtejustify\" style=\"text-align: justify\">\n\t\tAlgunas de las vulnerabilidades tienen m&aacute;s de una d&eacute;cada de antig&uuml;edad.\n\t<\/li>\n<\/ul>\n<p>\n\tVer <a href=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/03\/Vulnerability_Intelligence_Report-ENG.pdf\" target=\"_blank\">informe de Tenable en formato PDF<\/a>\n<\/p>\n<p>\n\tFuente: Segurm&aacute;tica.\n<\/p>\n<p>\n\t&nbsp;<\/p>\n<h3>Im\u00e1genes Relacionadas:<\/h3>","protected":false},"excerpt":{"rendered":"<p>El descubrimiento y la revelaci&oacute;n de vulnerabilidades contin&uacute;an aumentando en volumen y ritmo. Solo en 2017, se public&oacute; diariamente un promedio de 41 nuevas vulnerabilidades, lo que equivale a 15.038 para el a&ntilde;o. Adem&aacute;s, la cantidad de vulnerabilidades reveladas recientemente &hellip; <a href=\"https:\/\/blogs.uo.edu.cu\/seginf\/?p=1207\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15,28,40],"tags":[],"class_list":["post-1207","post","type-post","status-publish","format-standard","hentry","category-informaciones","category-seguridad-informatica","category-vulnerabilidades"],"_links":{"self":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1207"}],"version-history":[{"count":1,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1207\/revisions"}],"predecessor-version":[{"id":1211,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1207\/revisions\/1211"}],"wp:attachment":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}