{"id":73826,"date":"2018-02-18T14:00:09","date_gmt":"2018-02-18T14:00:09","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/02\/starting-today-ndss-highlights-best-internet-security-research\/"},"modified":"2025-11-14T15:23:24","modified_gmt":"2025-11-14T15:23:24","slug":"starting-today-ndss-highlights-best-internet-security-research","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/02\/starting-today-ndss-highlights-best-internet-security-research\/","title":{"rendered":"Simposio de Seguridad de Redes y Sistemas Distribuidos (NDSS) comienza hoy"},"content":{"rendered":"<img loading=\"lazy\" decoding=\"async\" class=\"post-img post-img-center 73596\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/02\/NDSS18_logo-25-Years.jpg\" alt=\"\" width=\"758\" height=\"228\" \/>\n<p>Seguramente ya han o\u00eddo hablar de todo tipo de vulnerabilidades e incidentes de seguridad de Internet que causan da\u00f1os en mundo entero, pero la otra cara de todo ese caos es todos los esfuerzos prometedores en curso para crear Internet m\u00e1s seguro, privado y confiable. A partir de hoy y hasta el mi\u00e9rcoles (18-21 de febrero), se llevar\u00e1 a cabo el Simposio deSeguridad de Redes y Sistemas Distribuidos (NDSS) (<a href=\"https:\/\/www.ndss-symposium.org\/ndss2018\/\">Network and Distributed Systems Security (NDSS) Symposium<\/a>) para presentar resultados de investigaciones innovadoras en el mundo de la seguridad de Internet.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/02\/starting-today-ndss-highlights-best-internet-security-research\/\">Saber m\u00e1s en ingl\u00e9s<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seguramente ya han o\u00eddo hablar de todo tipo de vulnerabilidades e incidentes de seguridad de Internet que causan da\u00f1os en mundo entero, pero la otra cara de todo ese caos es todos los esfuerzos prometedores en curso para crear Internet m\u00e1s seguro, privado y confiable. A partir de hoy y hasta el mi\u00e9rcoles (18-21 de [&hellip;]<\/p>\n","protected":false},"author":866,"featured_media":31053,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[186,168,190,179,4910,4777,184],"tags":[6205,3243],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4140],"class_list":["post-73826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confianza","category-normas-abiertos-de-internet","category-eventos","category-seguridad","category-fortalecimiento-de-internet","category-seguridad-es","category-tecnologia","tag-eventos","tag-simposio-de-seguridad-de-redes-y-sistemas-distribuidos-ndss","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",424,283,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",424,283,false],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",424,283,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",424,283,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",424,283,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",424,283,false],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2011\/09\/SanDiego.jpg",424,283,false]},"uagb_author_info":{"display_name":"Olaf Kolkman","author_link":"https:\/\/www.internetsociety.org\/es\/author\/kolkman\/"},"uagb_comment_info":0,"uagb_excerpt":"Seguramente ya han o\u00eddo hablar de todo tipo de vulnerabilidades e incidentes de seguridad de Internet que causan da\u00f1os en mundo entero, pero la otra cara de todo ese caos es todos los esfuerzos prometedores en curso para crear Internet m\u00e1s seguro, privado y confiable. A partir de hoy y hasta el mi\u00e9rcoles (18-21 de&hellip;","authors":[{"term_id":4140,"user_id":866,"is_guest":0,"slug":"kolkman","display_name":"Olaf Kolkman","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/73826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/866"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=73826"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/73826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/31053"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=73826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=73826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=73826"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=73826"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=73826"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=73826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}