{"id":46632,"date":"2026-04-30T17:59:05","date_gmt":"2026-04-30T21:59:05","guid":{"rendered":"https:\/\/jid.org\/?post_type=publicaciones&#038;p=46632"},"modified":"2026-04-30T17:59:16","modified_gmt":"2026-04-30T21:59:16","slug":"publicacion-del-episodio-2-de-la-iv-temporada-del-podcast-fronteras-de-la-tecnologia-ciberinteligencia-y-defensa-digital-en-las-infraestructuras-criticas","status":"publish","type":"publicaciones","link":"https:\/\/jid.org\/pt\/publicaciones\/publicacion-del-episodio-2-de-la-iv-temporada-del-podcast-fronteras-de-la-tecnologia-ciberinteligencia-y-defensa-digital-en-las-infraestructuras-criticas\/","title":{"rendered":"Publicaci\u00f3n del Episodio 2 de la IV Temporada del Podcast Fronteras de la Tecnolog\u00eda:  \u201cCiberinteligencia y Defensa Digital en las Infraestructuras Cr\u00edticas\u201d"},"featured_media":46637,"template":"","destacado":[361],"class_list":["post-46632","publicaciones","type-publicaciones","status-publish","has-post-thumbnail","hentry","destacado-si"],"_links":{"self":[{"href":"https:\/\/jid.org\/pt\/wp-json\/wp\/v2\/publicaciones\/46632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jid.org\/pt\/wp-json\/wp\/v2\/publicaciones"}],"about":[{"href":"https:\/\/jid.org\/pt\/wp-json\/wp\/v2\/types\/publicaciones"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jid.org\/pt\/wp-json\/wp\/v2\/media\/46637"}],"wp:attachment":[{"href":"https:\/\/jid.org\/pt\/wp-json\/wp\/v2\/media?parent=46632"}],"wp:term":[{"taxonomy":"destacado","embeddable":true,"href":"https:\/\/jid.org\/pt\/wp-json\/wp\/v2\/destacado?post=46632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}