{"id":244768,"date":"2025-12-01T18:05:59","date_gmt":"2025-12-01T18:05:59","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244768"},"modified":"2026-02-27T19:11:09","modified_gmt":"2026-02-27T19:11:09","slug":"security","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/our-work\/security\/","title":{"rendered":"Seguridad"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-ffc93ebd uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-tab uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c95947c4\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading animated fadeIn has-neutral-white-color has-text-color\">Seguridad<\/h1>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-77f5da99 uagb-columns__columns-1 uagb-columns__max_width-theme animated fadeIn background-image-fallback-white\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-bf6c64fb\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-32-font-size uag-hide-tab\"><strong>Una seguridad fuerte fomenta la confianza en Internet, permiti\u00e9ndole impulsar la innovaci\u00f3n econ\u00f3mica y social.<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size uag-hide-desktop\"><strong>Una seguridad fuerte fomenta la confianza en Internet, permiti\u00e9ndole impulsar la innovaci\u00f3n econ\u00f3mica y social.<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Mantener una Internet segura y protegida y a la vez preservar sus propiedades fundamentales y su naturaleza global es nuestra responsabilidad colectiva.<\/p>\n\n\n\n<p class=\"has-18-font-size\">El dise\u00f1o y la implementaci\u00f3n de soluciones de seguridad deben considerar su posible impacto en estos principios fundamentales, como la accesibilidad, la colaboraci\u00f3n, la interoperabilidad y la descentralizaci\u00f3n.<\/p>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-de3d1d5d uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f338041f\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-text-align-left\">Seguridad<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading o-typing-faster has-depth-blue-color has-text-color\"><strong>Una seguridad fuerte fomenta la confianza en Internet, permiti\u00e9ndole impulsar la innovaci\u00f3n econ\u00f3mica y social.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1500\" height=\"816\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg\" alt=\"Un ni\u00f1o peque\u00f1o habla animadamente por un celular.\" class=\"wp-image-239465\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg 1500w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-450x245.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-1024x557.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-768x418.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-250x136.jpg 250w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Mantener una Internet segura y protegida y a la vez preservar sus propiedades fundamentales y su naturaleza global es nuestra responsabilidad colectiva.<\/p>\n\n\n\n<p class=\"has-18-font-size\">El dise\u00f1o y la implementaci\u00f3n de soluciones de seguridad deben considerar su posible impacto en estos principios fundamentales, como la accesibilidad, la colaboraci\u00f3n, la interoperabilidad y la descentralizaci\u00f3n.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-418cec14 uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-d509319b\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Enlaces clave sobre privacidad<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Enlaces clave sobre privacidad<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS2025_hallway-chats_banner-1.jpeg\" alt=\"Dos hombres de pie sobre un tejado, observando atentamente un objeto fuera de cuadro.\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4be958dc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/action-plan\/ndss-symposium\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Simposio de NDSS<\/h3><\/div><p class=\"uagb-ifb-desc\">El Simposio de Seguridad de Redes y Sistemas Distribuidos (NDSS) fomenta el intercambio de informaci\u00f3n entre investigadores y profesionales. <\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"562\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3.jpg\" alt=\"Un grupo de personas participa en un taller de cifrado en Bruselas.\" class=\"wp-image-227469\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3-450x253.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3-768x432.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3-250x141.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8987a0a2 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/action-plan\/encryption\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Cifrado<\/h3><\/div><p class=\"uagb-ifb-desc\">El cifrado es una herramienta de seguridad fundamental para proteger la informaci\u00f3n personal y mantenernos seguros en l\u00ednea.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"564\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training.jpg\" alt=\"Un grupo de mujeres sentadas frente a computadoras participa en una capacitaci\u00f3n del Cap\u00edtulo de Chad.\" class=\"wp-image-234904\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training-450x254.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training-768x433.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training-250x141.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-142f9c5f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/learning\/internet-security\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Curso en l\u00ednea sobre seguridad de Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Ampl\u00ede sus conocimientos sobre seguridad de Internet con nuestro curso gratuito en l\u00ednea. Conozca aspectos espec\u00edficos de ciberseguridad relacionados con la Internet global.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-5ddb0c47 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-914f3b48\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"550\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House.jpg\" alt=\"Vista exterior de la Casa Blanca.\" class=\"wp-image-218658\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House.jpg 1200w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House-250x115.jpg 250w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4fea2dee uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/our-work\/security\/security-policy\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Pol\u00edtica de seguridad<\/h3><\/div><p class=\"uagb-ifb-desc\">Los formuladores de pol\u00edticas pueden fortalecer o debilitar la seguridad de Internet. Explore c\u00f3mo las pol\u00edticas afectan el ecosistema de seguridad en l\u00ednea.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-48a0fca8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"441\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-1024x441.jpg\" alt=\"Una persona joven absorta en su tel\u00e9fono.\" class=\"wp-image-224362\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-1024x441.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-450x194.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-768x331.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-250x108.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg 1278w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-7475369c uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/deploy360\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Tecnolog\u00edas de Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Las tecnolog\u00edas de Internet evolucionan continuamente para brindar experiencias en l\u00ednea m\u00e1s r\u00e1pidas y seguras.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a02a5926\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1.jpg\" alt=\"Varias personas sentadas a una mesa mantienen una conversaci\u00f3n animada.\" class=\"wp-image-239453\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1.jpg 800w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1-768x512.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1-250x167.jpg 250w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/collaborativesecurity\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Seguridad colaborativa<\/h3><\/div><p class=\"uagb-ifb-desc\">En \u00faltima instancia, las personas son quienes mantienen unida a Internet. La cooperaci\u00f3n y la colaboraci\u00f3n son fundamentales para garantizar la seguridad y prosperidad de Internet.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-774cf726 uagb-columns__columns-2 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e1fd0b78\"><div class=\"uagb-column__overlay\"><\/div>\n<h3 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\">Sin investigaci\u00f3n, no hay Internet<\/h3>\n\n\n\n<h3 class=\"wp-block-heading uag-hide-desktop\">Sin investigaci\u00f3n, no hay Internet<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Desde hace m\u00e1s de tres d\u00e9cadas, organizamos el Simposio de Seguridad de Redes y Sistemas Distribuidos (NDSS) para reunir a quienes trabajan para hacer que nuestras interacciones en l\u00ednea sean seguras.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Desde c\u00f3mo mantener el anonimato de nuestras ideas hasta c\u00f3mo frustrar las estafas de phishing, el NDSS 2025 present\u00f3 investigaciones de vanguardia provenientes de la industria y del mundo acad\u00e9mico.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-neutral-white-color has-depth-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.internetsociety.org\/blog\/2025\/06\/no-research-no-internet\/\"><strong>Lea el art\u00edculo en el blog<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-9ec2654d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"470\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-1024x470.jpg\" alt=\"Personas sentadas en el p\u00fablico del simposio NDSS observan atentamente.\" class=\"wp-image-225220\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-1024x470.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-450x207.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-768x353.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>\u00daltimas novedades<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>\u00daltimas novedades<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1732' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1732\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Buscar por palabra clave\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenido<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (110)<\/span><\/option><option value=\"events-type\" >Eventos<span class=\"cvp-count\"> (14)<\/span><\/option><option value=\"news-type\" >Noticias<span class=\"cvp-count\"> (14)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Comunicados de prensa<span class=\"cvp-count\"> (11)<\/span><\/option><option value=\"declaraciones\" >&nbsp;&nbsp;&nbsp;Declaraciones<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"resources-type\" >Recurso<span class=\"cvp-count\"> (29)<\/span><\/option><option value=\"policy-briefs\" >&nbsp;&nbsp;&nbsp;Informes de pol\u00edticas p\u00fablicas<span class=\"cvp-count\"> (6)<\/span><\/option><option value=\"speeches-type\" >&nbsp;&nbsp;&nbsp;Discursos<span class=\"cvp-count\"> (1)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_category\"><option value=\"\">Tema<\/option><option value=\"deploy360-es\" >Tecnolog\u00edas de Internet<span class=\"cvp-count\"> (58)<\/span><\/option><option value=\"cifrado\" >Cifrado<span class=\"cvp-count\"> (54)<\/span><\/option><option value=\"seguridad-es\" >Seguridad<span class=\"cvp-count\"> (115)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">Regi\u00f3n<\/option><option value=\"africa\" >\u00c1frica<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"asia-y-el-pacifico\" >Asia y el Pacifico<span class=\"cvp-count\"> (15)<\/span><\/option><option value=\"europa\" >Europa<span class=\"cvp-count\"> (22)<\/span><\/option><option value=\"global\" >Global<span class=\"cvp-count\"> (116)<\/span><\/option><option value=\"america-latina-y-el-caribe\" >America Latina y el Caribe<span class=\"cvp-count\"> (9)<\/span><\/option><option value=\"oriente-medio\" >Oriente Medio<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"america-del-norte\" >America del Norte<span class=\"cvp-count\"> (16)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-bu5bn556\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"247734\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2026\/04\/dns-blocking-mind-the-unintended-consequences\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Bloqueo por DNS: cuidado con las consecuencias imprevistas\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"A screen displays a repeated error message\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-768x352.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2026-04-03T13:00:00+00:00\">3 de abril de 2026<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2026\/04\/dns-blocking-mind-the-unintended-consequences\/\" class=\"_self\" target=\"_self\" aria-label=\"Bloqueo por DNS: cuidado con las consecuencias imprevistas\">Bloqueo por DNS: cuidado con las consecuencias imprevistas<\/a><\/h2><div class=\"pt-cv-content\">A medida que se multiplican las medidas de bloqueo de DNS, tambi\u00e9n aumentan las preocupaciones sobre la seguridad, la apertura &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"241253\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/informe-de-politicas-seguridad-en-linea-y-restricciones-de-edad\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/policy-briefs\/' title='Informes de pol\u00edticas p\u00fablicas' class='pt-cv-tax-policy-briefs'>Informes de pol\u00edticas p\u00fablicas<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-04T12:01:00+00:00\">4 de diciembre de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/informe-de-politicas-seguridad-en-linea-y-restricciones-de-edad\/\" class=\"_self\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\">Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad<\/a><\/h2><div class=\"pt-cv-content\">Si bien suelen tener buenas intenciones, las pol\u00edticas que exigen la verificaci\u00f3n de edad crean riesgos para la privacidad, la &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"230519\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/perspectivas-sobre-el-bloqueo-de-contenido-en-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/policy-briefs\/' title='Informes de pol\u00edticas p\u00fablicas' class='pt-cv-tax-policy-briefs'>Informes de pol\u00edticas p\u00fablicas<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-09-04T11:31:06+00:00\">4 de septiembre de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/perspectivas-sobre-el-bloqueo-de-contenido-en-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\">Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet<\/a><\/h2><div class=\"pt-cv-content\">Internet Society alienta a los formuladores de pol\u00edticas a priorizar soluciones que aborden el contenido da\u00f1ino en su origen, en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"226002\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/news\/declarationes\/2025\/lanzamiento-del-fondo-common-good-cyber-para-fortalecer-la-seguridad-de-internet-a-nivel-mundial\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Lanzamiento del Fondo Common Good Cyber para fortalecer la seguridad de Internet a nivel mundial\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Lanzamiento del Fondo Common Good Cyber para fortalecer la seguridad de Internet a nivel mundial\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/declaraciones\/' title='Declaraciones' class='pt-cv-tax-declaraciones'>Declaraciones<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/news-type\/' title='Noticias' class='pt-cv-tax-news-type'>Noticias<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-06-23T13:07:39+00:00\">23 de junio de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/news\/declarationes\/2025\/lanzamiento-del-fondo-common-good-cyber-para-fortalecer-la-seguridad-de-internet-a-nivel-mundial\/\" class=\"_self\" target=\"_self\" aria-label=\"Lanzamiento del Fondo Common Good Cyber para fortalecer la seguridad de Internet a nivel mundial\">Lanzamiento del Fondo Common Good Cyber para fortalecer la seguridad de Internet a nivel mundial<\/a><\/h2><div class=\"pt-cv-content\">Internet Society y la Global Cyber Alliance, en nombre de la secretar\u00eda de Common Good Cyber, anuncian el lanzamiento del &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"227165\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"\u00bfQu\u00e9 es una puerta trasera de cifrado?\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"A bit of light spills out of a dark door.\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-05-02T17:59:50+00:00\">2 de mayo de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" class=\"_self\" target=\"_self\" aria-label=\"\u00bfQu\u00e9 es una puerta trasera de cifrado?\">\u00bfQu\u00e9 es una puerta trasera de cifrado?<\/a><\/h2><div class=\"pt-cv-content\">Una puerta trasera de cifrado es un tipo de acceso excepcional que una plataforma concede a terceros &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"223404\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"hands typing on a keyboard\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-768x352.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-04-17T20:08:44+00:00\">17 de abril de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" class=\"_self\" target=\"_self\" aria-label=\"Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla\">Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla<\/a><\/h2><div class=\"pt-cv-content\">Veamos qu\u00e9 significa confianza en Internet, qu\u00e9 hace que Internet sea confiable y por qu\u00e9 deber\u00eda importarnos &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"214876\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2024\/estudio-de-caso-la-ley-de-noticias-en-linea-de-canada-perjudica-al-periodismo-a-la-competencia-y-a-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-09-24T13:00:25+00:00\">24 de septiembre de 2024<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2024\/estudio-de-caso-la-ley-de-noticias-en-linea-de-canada-perjudica-al-periodismo-a-la-competencia-y-a-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet\">Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet<\/a><\/h2><div class=\"pt-cv-content\">Muchos pa\u00edses est\u00e1n evaluando nuevas leyes para apoyar a la industria de las noticias, que enfrenta dificultades debido a la &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"205179\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2023\/escaneo-del-lado-del-cliente\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Escaneo del lado del cliente\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Escaneo del lado del cliente\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-12-13T15:05:02+00:00\">13 de diciembre de 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2023\/escaneo-del-lado-del-cliente\/\" class=\"_self\" target=\"_self\" aria-label=\"Escaneo del lado del cliente\">Escaneo del lado del cliente<\/a><\/h2><div class=\"pt-cv-content\">Lea acerca de las recomendaciones de Internet Society al reglamento propuesto por el Parlamento Europeo para prevenir y combatir el &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"203064\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/11\/la-iniciativa-manrs-alcanza-cotas-mas-altas\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"La iniciativa MANRS alcanza cotas m\u00e1s altas\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a mountain peak covered with snow seen through colorful prayer flags\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1.jpg 1440w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-11-02T15:00:00+00:00\">2 de noviembre de 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/11\/la-iniciativa-manrs-alcanza-cotas-mas-altas\/\" class=\"_self\" target=\"_self\" aria-label=\"La iniciativa MANRS alcanza cotas m\u00e1s altas\">La iniciativa MANRS alcanza cotas m\u00e1s altas<\/a><\/h2><div class=\"pt-cv-content\">En asociaci\u00f3n con la Global Cyber Alliance (GCA), creemos que la iniciativa MANRS seguir\u00e1 consolid\u00e1ndose como la referencia mundialmente reconocida &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"19\" data-currentpage=\"1\" data-sid=\"bu5bn556\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244768\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244768\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">&hellip;<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244768\/?_page=19\">19<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244768\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Cargando...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-bu5bn556 {text-align: left}\n#pt-cv-view-bu5bn556 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-bu5bn556 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-bu5bn556 .pt-cv-meta-fields {  }#pt-cv-view-bu5bn556 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-bu5bn556 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper {  }#pt-cv-view-bu5bn556[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-bu5bn556:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 .pt-cv-thumbnail {  }#pt-cv-view-bu5bn556 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-bu5bn556 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-bu5bn556 .pt-cv-rmwrap {  }#pt-cv-view-bu5bn556 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-bu5bn556 .pt-cv-taxoterm {  }#pt-cv-view-bu5bn556 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-bu5bn556 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Cr\u00e9dito de la imagen:&nbsp;<br>\u00a9 Sagar Biswas from Pixabay, \u00a9 Wes Hardaker, \u00a9 Nicolas Olivier, \u00a9 Internet Society Chad Chapter, creative commons (two photos), \u00a9 Flawless Events, \u00a9 Wes Hardaker<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mantener una Internet segura y protegida y a la vez preservar sus propiedades fundamentales y su naturaleza global es nuestra responsabilidad colectiva.<\/p>\n","protected":false},"author":1898,"featured_media":239465,"parent":47380,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[6074],"class_list":["post-244768","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",1500,816,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-450x245.jpg",450,245,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-768x418.jpg",768,418,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-1024x557.jpg",1024,557,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",1500,816,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",1500,816,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-250x136.jpg",250,136,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",300,163,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",400,218,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",600,326,false]},"uagb_author_info":{"display_name":"Agustin Bianchi","author_link":"https:\/\/www.internetsociety.org\/es\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Mantener una Internet segura y protegida y a la vez preservar sus propiedades fundamentales y su naturaleza global es nuestra responsabilidad colectiva.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1898"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=244768"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244768\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/47380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/239465"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=244768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=244768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=244768"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=244768"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=244768"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=244768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}