{"id":2789,"date":"2025-05-15T06:43:17","date_gmt":"2025-05-15T06:43:17","guid":{"rendered":"https:\/\/renic.es\/agente\/cybersecurity-cluster\/"},"modified":"2025-06-02T07:41:24","modified_gmt":"2025-06-02T07:41:24","slug":"cybersecurity-cluster","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/cybersecurity-cluster\/","title":{"rendered":"Cybersecurity Cluster"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[476,512,682,445,647,428,443,655,472,481,444,637,561,496,497,515,645,593,595,684,575,582,627,675,429,587,547,643,526,700,626,549,489,586,467,660,676,461,430,678,468],"area-investigacion-agente":[414,422,415,423,418,424,417],"ccaa-agente":[727],"ente-juridico-agente":[759],"tipologia-agente":[],"class_list":["post-2789","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-and-authentication","topics-investigacion-egente-anomaly-detection","topics-investigacion-egente-anonymous-authentication-systems","topics-investigacion-egente-authentication-of-transactions-at-global-level","topics-investigacion-egente-authentication-protocols","topics-investigacion-egente-big-data-analysis-focussed-on-privacy","topics-investigacion-egente-biometric-authentication","topics-investigacion-egente-bridging-the-digital-divide","topics-investigacion-egente-confidence-and-reliable-big-data","topics-investigacion-egente-creation-of-barriers-to-entry","topics-investigacion-egente-cryptographic-authentication","topics-investigacion-egente-data-protection-confidentiality","topics-investigacion-egente-decision-making-management-tools","topics-investigacion-egente-development-of-applications","topics-investigacion-egente-development-of-automatic-defences","topics-investigacion-egente-early-detection-of-cyber-risks","topics-investigacion-egente-encryption-protocols-for-preserving-privacy","topics-investigacion-egente-improved-security-in-technological-standards","topics-investigacion-egente-improvement-of-security-protocols-and-standards","topics-investigacion-egente-industrial-control-systems-in-networks-water-electricity-food-transport-finance-health-e-health-etc","topics-investigacion-egente-integration-of-systems","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-iot-privacy","topics-investigacion-egente-it-attack-insurance","topics-investigacion-egente-large-scale-data-analysis","topics-investigacion-egente-management-of-identity","topics-investigacion-egente-online-fraud","topics-investigacion-egente-physical-data-protection","topics-investigacion-egente-preparation-of-mechanisms-to-respond-to-attacks","topics-investigacion-egente-privacy-enhancing-technology-pet","topics-investigacion-egente-privacy-in-the-cloud","topics-investigacion-egente-reliable-global-level-identity-generation","topics-investigacion-egente-risk-quantification","topics-investigacion-egente-secure-development-languages-and-frameworks","topics-investigacion-egente-secure-multipart-computing","topics-investigacion-egente-security-privacy-through-design","topics-investigacion-egente-security-support-services","topics-investigacion-egente-smart-cities-and-safe-cities","topics-investigacion-egente-statistical-and-predictive-risk-analysis","topics-investigacion-egente-threat-and-attack-simulation","topics-investigacion-egente-verifiable-computing","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-privacy","area-investigacion-agente-promotion-and-awareness-of-safety","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-comunidad-de-madrid","ente-juridico-agente-universidad-rey-juan-carlos-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2789"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2789"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2789"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2789"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2789"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}