{"version":"1.0","provider_name":"Intangibles","provider_url":"https:\/\/intangibles.legal\/en\/","author_name":"admin","author_url":"https:\/\/intangibles.legal\/en\/author\/admin\/","title":"Normativa de Ciberseguridad , la NIS II. - Intangibles","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jV2kDsgAje\"><a href=\"https:\/\/intangibles.legal\/en\/normativa-de-ciberseguridad-la-nis-ii\/\">Normativa de Ciberseguridad , la NIS II.<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/intangibles.legal\/en\/normativa-de-ciberseguridad-la-nis-ii\/embed\/#?secret=jV2kDsgAje\" width=\"600\" height=\"338\" title=\"&#8220;Normativa de Ciberseguridad , la NIS II.&#8221; &#8212; Intangibles\" data-secret=\"jV2kDsgAje\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/intangibles.legal\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/intangibles.legal\/wp-content\/uploads\/2024\/01\/estrella.png","thumbnail_width":563,"thumbnail_height":287,"description":"En el mundo digital actual, la seguridad cibern\u00e9tica es fundamental. La Directiva NIS I, aprobada en 2016, marc\u00f3 un hito, pero su aplicaci\u00f3n plante\u00f3 tambi\u00e9n incongruencias en la aplicaci\u00f3n en los diferentes estados miembros."}