{"id":120909,"date":"2020-08-21T00:00:10","date_gmt":"2020-08-21T00:00:10","guid":{"rendered":"https:\/\/www.internetsociety.org\/?post_type=news&#038;p=120909"},"modified":"2025-11-27T17:52:22","modified_gmt":"2025-11-27T17:52:22","slug":"dnssec-por-que-querria-implementarlo-en-su-dominio","status":"publish","type":"news","link":"https:\/\/www.internetsociety.org\/es\/news\/en-las-noticias\/2020\/dnssec-por-que-querria-implementarlo-en-su-dominio\/","title":{"rendered":"DNSSEC: \u00bfPor qu\u00e9 querr\u00eda implementarlo en su dominio?"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1551,"featured_media":0,"template":"","categories":[6188,168,4907,2584,4910,4777,147],"tags":[6239],"region_news_regions":[6030],"content_category":[],"class_list":["post-120909","news","type-news","status-publish","hentry","category-como-funciona-internet","category-normas-abiertos-de-internet","category-estandares-abiertos-en-todas-partes","category-extensiones-de-seguridad-del-dns-es","category-fortalecimiento-de-internet","category-seguridad-es","category-deploy360-es","tag-extensiones-de-seguridad-del-sistema-de-nombres-de-dominio-dnssec","region_news_regions-global","news_type-en-las-noticias"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"M\u00f4nica Fast","author_link":"https:\/\/www.internetsociety.org\/es\/author\/fast\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/news\/120909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1551"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=120909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=120909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=120909"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=120909"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=120909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}