{"id":40763,"date":"2024-08-16T09:14:21","date_gmt":"2024-08-16T15:14:21","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=40763"},"modified":"2026-03-09T02:24:21","modified_gmt":"2026-03-09T08:24:21","slug":"entrevista-de-cyberrisk-tv-hablemos-con-franqueza-sobre-como-la-ia-puede-ayudar-a-los-secop","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/","title":{"rendered":"Entrevista de CyberRisk TV: Hablemos con franqueza sobre c\u00f3mo la IA puede ayudar a SecOps"},"content":{"rendered":"<section class=\"bs-section bs-section-4b500e99ef8cdebaf3ddaa6a36e7fb461e386ddc bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-d4f201cab41f0341a7cbb32888b9ef9b39ce8318 bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>V\u00eddeos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Entrevista de CyberRisk TV: Hablemos con franqueza sobre c\u00f3mo la IA puede ayudar a SecOps<\/h1>\n\n\n<p><span style=\"font-weight: 400;\">\u00a1\u00danete a Mike Lyborg, CISO de Swimlane, y a Mandy Logan, de SC Media, mientras desgranan los secretos de la IA! Si bien la IA generativa no es un tema de actualidad, tampoco es la primera vez que la industria de la ciberseguridad adopta tecnolog\u00edas emergentes que pueden imitar las acciones humanas.<\/span><a href=\"https:\/\/swimlane.com\/es\/blog\/automatizacion-de-la-seguridad\/\"><span style=\"font-weight: 400;\">\u00a0<\/span><\/a><\/p>\n<p><a href=\"https:\/\/swimlane.com\/es\/blog\/automatizacion-de-la-seguridad\/\"><span style=\"font-weight: 400;\">Automatizaci\u00f3n de la seguridad<\/span><\/a><span style=\"font-weight: 400;\"> Y su capacidad para actuar en nombre de los humanos ha allanado el camino para que la IA generativa sea confiable (dentro de lo razonable). La convergencia y la madurez de estas tecnolog\u00edas ahora tienen el potencial de revolucionar el funcionamiento de SecOps, a la vez que multiplican la fuerza. <\/span><a href=\"https:\/\/swimlane.com\/es\/blog\/roles-y-responsabilidades-del-equipo-de-soc\/\"><span style=\"font-weight: 400;\">Equipos SOC.\u00a0<\/span><\/a><\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"100%\" height=\"auto\" style=\"min-height:520px\" src=\"https:\/\/www.youtube.com\/embed\/howgipIUHtA?si=7on8xNBTjPSa9nBD\" title=\"Reproductor de v\u00eddeo de YouTube\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-aa6eb5dfda60c91b965e7c072905992179763573 bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Tambi\u00e9n te podr\u00eda interesar<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-b43fa869b558d43fa93bdd41503b8820f2f54817 bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e3509cc31f7 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/vulnerability-and-patch-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-Management-vs.-Patch-Management-Explained-Masthead.webp' class='img-fluid' alt='' title='Gesti\u00f3n de vulnerabilidades vs. gesti\u00f3n de parches: explicaci\u00f3n - Masthead'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Explicaci\u00f3n de la gesti\u00f3n de vulnerabilidades frente a la gesti\u00f3n de parches<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e3509cc4e09 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resources\/reports\/tag-ai-secops-automation\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/TAG-Cyber-Tech-Report.webp' class='img-fluid' alt='' title='Informe sobre tecnolog\u00eda cibern\u00e9tica de TAG'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Informe<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Informe de tecnolog\u00eda cibern\u00e9tica de TAG: Uso de IA para la automatizaci\u00f3n de SecOps<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e3509cc68e6 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/news\/artificial-intelligence-learning-algorithms-cybersecurity-innovations\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Black-Hat-AI-PR-OG-Image.jpg' class='img-fluid' alt='Agencia del gobierno federal de EE.UU. ahorra $40M con automatizaci\u00f3n de seguridad Swimlane. . ' title='Imagen OG de relaciones p\u00fablicas de inteligencia artificial de Black Hat'   \/>\n                                <figcaption class='figure-caption'>Los algoritmos de aprendizaje de IA de \u00faltima generaci\u00f3n impulsan nuevas innovaciones en ciberseguridad de IA <\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>Los algoritmos de aprendizaje de IA de \u00faltima generaci\u00f3n impulsan nuevas innovaciones en ciberseguridad de la IA de Swimlane<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":40764,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":40764,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"2024-02-26 08:29:32","event_end_date":"2024-02-26 08:29:32","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[105],"resource-topic":[215,219],"resource-industry":[108,99],"blog-category":[],"class_list":["post-40763","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-videos","resource-topic-ai","resource-topic-company-culture","resource-industry-use-case","resource-industry-alert-triage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Let\u2019s Get Real About Where AI can Help SecOps | Swimlane<\/title>\n<meta name=\"description\" content=\"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/recursos\/videos\/entrevista-de-sombrero-negro-para-ciso-value-ai-secops\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberRisk TV Interview: Let\u2019s Get Real About Where AI can Help SecOps\" \/>\n<meta property=\"og:description\" content=\"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/recursos\/videos\/entrevista-de-sombrero-negro-para-ciso-value-ai-secops\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T08:24:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams. %\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/\",\"url\":\"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/\",\"name\":\"Let\u2019s Get Real About Where AI can Help SecOps | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png\",\"datePublished\":\"2024-08-16T15:14:21+00:00\",\"dateModified\":\"2026-03-09T08:24:21+00:00\",\"description\":\"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberRisk TV Interview: Let\u2019s Get Real About Where AI can Help SecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Seamos realistas sobre c\u00f3mo la IA puede ayudar a SecOps | Swimlane","description":"\u00danase a Mike Lyborg, CISO de Swimlane, y Mandy Logan de SC Media mientras analizan casos de uso de automatizaci\u00f3n mejorados con IA que benefician a los equipos SOC.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/recursos\/videos\/entrevista-de-sombrero-negro-para-ciso-value-ai-secops\/","og_locale":"es_ES","og_type":"article","og_title":"CyberRisk TV Interview: Let\u2019s Get Real About Where AI can Help SecOps","og_description":"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams.","og_url":"https:\/\/swimlane.com\/es\/recursos\/videos\/entrevista-de-sombrero-negro-para-ciso-value-ai-secops\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-09T08:24:21+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams. %","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/","url":"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/","name":"Seamos realistas sobre c\u00f3mo la IA puede ayudar a SecOps | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png","datePublished":"2024-08-16T15:14:21+00:00","dateModified":"2026-03-09T08:24:21+00:00","description":"\u00danase a Mike Lyborg, CISO de Swimlane, y Mandy Logan de SC Media mientras analizan casos de uso de automatizaci\u00f3n mejorados con IA que benefician a los equipos SOC.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"CyberRisk TV Interview: Let\u2019s Get Real About Where AI can Help SecOps"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/40763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/40763\/revisions"}],"predecessor-version":[{"id":54777,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/40763\/revisions\/54777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/40764"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=40763"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=40763"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=40763"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=40763"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=40763"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=40763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}