{"id":2123,"date":"2025-04-29T12:36:10","date_gmt":"2025-04-29T12:36:10","guid":{"rendered":"https:\/\/www.captcha.eu\/?p=2123"},"modified":"2025-04-30T09:00:27","modified_gmt":"2025-04-30T09:00:27","slug":"what-is-cyber-threat-intelligence-cti","status":"publish","type":"post","link":"https:\/\/new.captcha.eu\/es\/que-es-la-inteligencia-de-amenazas-ciberneticas-cti\/","title":{"rendered":"\u00bfQu\u00e9 es la inteligencia sobre amenazas cibern\u00e9ticas (CTI)?"},"content":{"rendered":"<p>Toda empresa, independientemente de su tama\u00f1o, se enfrenta al riesgo de ciberamenazas. En un mundo donde los ataques pueden provenir de cualquier lugar y en cualquier momento, comprender y anticipar estas amenazas es crucial para proteger los datos, los sistemas y la reputaci\u00f3n de su organizaci\u00f3n. Aqu\u00ed es donde <strong>Inteligencia sobre amenazas cibern\u00e9ticas (CTI)<\/strong> Entra en juego. En lugar de simplemente reaccionar ante las amenazas una vez que ocurren, la CTI proporciona a las empresas el conocimiento necesario para identificar y responder a los peligros potenciales antes de que causen da\u00f1os.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><h2>Tabla de contenido<\/h2><ul><li><a href=\"#h-what-is-cyber-threat-intelligence-cti\" data-level=\"2\">\u00bfQu\u00e9 es la inteligencia sobre amenazas cibern\u00e9ticas (CTI)?<\/a><\/li><li><a href=\"#h-why-cti-matters-for-businesses\" data-level=\"2\">Por qu\u00e9 la CTI es importante para las empresas<\/a><\/li><li><a href=\"#h-how-cyber-threat-intelligence-works\" data-level=\"2\">C\u00f3mo funciona la inteligencia sobre amenazas cibern\u00e9ticas<\/a><\/li><li><a href=\"#h-types-of-cyber-threat-intelligence\" data-level=\"2\">Tipos de inteligencia sobre amenazas cibern\u00e9ticas<\/a><\/li><li><a href=\"#h-lifecycle-of-cyber-threat-intelligence\" data-level=\"2\">Ciclo de vida de la inteligencia sobre ciberamenazas<\/a><\/li><li><a href=\"#h-how-cti-supports-web-security-and-bot-protection\" data-level=\"2\">C\u00f3mo CTI apoya la seguridad web y la protecci\u00f3n contra bots<\/a><\/li><li><a href=\"#h-conclusion\" data-level=\"2\">Conclusi\u00f3n<\/a><\/li><\/ul><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-9397fe589b06dba36cb38eea8b6b2820\" id=\"h-what-is-cyber-threat-intelligence-cti\" style=\"color:#2b7ca4\">\u00bfQu\u00e9 es la inteligencia sobre amenazas cibern\u00e9ticas (CTI)?<\/h2>\n\n\n\n<p>La inteligencia de ciberamenazas se refiere al proceso de recopilar, analizar e interpretar informaci\u00f3n sobre ciberamenazas para comprender mejor los riesgos potenciales. Implica recopilar datos sin procesar de diversas fuentes, como informes p\u00fablicos, incidentes de seguridad y actividades delictivas, y transformarlos en informaci\u00f3n \u00fatil. Con la CTI, las empresas obtienen una visi\u00f3n m\u00e1s clara de qui\u00e9n podr\u00eda estar en su punto de mira, por qu\u00e9 y qu\u00e9 m\u00e9todos podr\u00edan utilizar.<\/p>\n\n\n\n<p>El verdadero valor de la CTI reside en su capacidad para ayudar a las organizaciones no solo a reaccionar ante incidentes de seguridad, sino tambi\u00e9n a predecirlos y prevenirlos. Al comprender mejor las t\u00e1cticas, t\u00e9cnicas y procedimientos (TTP) de los atacantes, las empresas pueden fortalecer sus defensas y reducir el riesgo de ataques exitosos.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-c0d330edfba4c3c7cb995e2732a66756\" id=\"h-why-cti-matters-for-businesses\" style=\"color:#2b7ca4\">Por qu\u00e9 la CTI es importante para las empresas<\/h2>\n\n\n\n<p>El acceso a la inteligencia sobre ciberamenazas ayuda a las empresas a prepararse y responder ante ellas. Proporciona contexto que permite a los equipos de seguridad detectar ataques con mayor rapidez, mitigar riesgos y tomar decisiones informadas sobre inversiones en ciberseguridad.<\/p>\n\n\n\n<p>Para las empresas, CTI ofrece varias ventajas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Defensa proactiva<\/strong>Al comprender las motivaciones y t\u00e1cticas de los atacantes, las empresas pueden ir un paso por delante. La CTI permite a los equipos de seguridad establecer defensas adaptadas a los patrones de amenazas conocidos, previniendo ataques antes de que ocurran.<\/li>\n\n\n\n<li><strong>Respuesta mejorada a incidentes<\/strong>Cuando se producen ataques, la CTI proporciona un contexto valioso que ayuda a los equipos a identificar r\u00e1pidamente la naturaleza de la amenaza. Esto permite una contenci\u00f3n y recuperaci\u00f3n m\u00e1s r\u00e1pidas, minimizando el impacto en las operaciones.<\/li>\n\n\n\n<li><strong>Gesti\u00f3n de riesgos priorizada<\/strong>Ante la gran cantidad de amenazas que enfrentan las organizaciones, la CTI ayuda a priorizar los riesgos m\u00e1s cr\u00edticos, lo que permite a las empresas concentrar sus recursos en las \u00e1reas que requieren mayor atenci\u00f3n. Esto garantiza un uso m\u00e1s eficiente del tiempo y el presupuesto.<\/li>\n\n\n\n<li><strong>Reducci\u00f3n de costos<\/strong>Al prevenir ciberataques exitosos, las empresas pueden evitar el impacto financiero de las filtraciones de datos, los costos de recuperaci\u00f3n y las multas regulatorias. La inteligencia de ciberamenazas puede reducir significativamente la probabilidad de incidentes costosos, como ataques de ransomware y filtraciones de datos.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-6c33e69ea2a1f4634bae18787fac85da\" id=\"h-how-cyber-threat-intelligence-works\" style=\"color:#2b7ca4\">C\u00f3mo funciona la inteligencia sobre amenazas cibern\u00e9ticas<\/h2>\n\n\n\n<p>La base de la CTI es la recopilaci\u00f3n y el an\u00e1lisis de datos de m\u00faltiples fuentes. Estos datos pueden provenir de informes de c\u00f3digo abierto, registros de redes internas e incluso redes de inteligencia privadas. Las plataformas CTI modernas suelen utilizar <strong>inteligencia artificial (IA)<\/strong> y <strong>aprendizaje autom\u00e1tico<\/strong> Analizar grandes cantidades de datos e identificar patrones que puedan indicar amenazas potenciales. Esto ayuda a las empresas a automatizar el proceso de detecci\u00f3n de amenazas, reduciendo la posibilidad de pasar por alto riesgos emergentes.<\/p>\n\n\n\n<p>La CTI recopila informaci\u00f3n que se procesa y analiza para identificar Indicadores de Compromiso (IOC), se\u00f1ales espec\u00edficas de un ataque en curso o pasado. Estos pueden incluir direcciones IP maliciosas, archivos sospechosos o cuentas de usuario comprometidas. Con esta informaci\u00f3n, las empresas pueden actuar con rapidez para bloquear amenazas y prevenir da\u00f1os.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-db957134d02884266d4b68b9152dd589\" id=\"h-types-of-cyber-threat-intelligence\" style=\"color:#2b7ca4\">Tipos de inteligencia sobre amenazas cibern\u00e9ticas<\/h2>\n\n\n\n<p>La inteligencia sobre ciberamenazas suele clasificarse seg\u00fan el nivel de detalle que proporciona y qui\u00e9n la utiliza. Estas categor\u00edas ayudan a las organizaciones a comprender mejor c\u00f3mo aplicar la informaci\u00f3n a sus estrategias de seguridad:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Inteligencia estrat\u00e9gica<\/strong> Proporciona una visi\u00f3n general del panorama de amenazas y est\u00e1 dirigido a ejecutivos y responsables de la toma de decisiones. Se centra en comprender las tendencias generales de ciberseguridad que podr\u00edan afectar a la empresa, como las amenazas globales emergentes o los cambios en las t\u00e1cticas de ataque de los ciberdelincuentes.<\/li>\n\n\n\n<li><strong>Inteligencia t\u00e1ctica<\/strong> Profundiza en amenazas espec\u00edficas y proporciona informaci\u00f3n detallada sobre las t\u00e1cticas, t\u00e9cnicas y pr\u00e1cticas (TTP) empleadas por los atacantes. Es m\u00e1s t\u00e9cnico y lo utilizan los equipos de seguridad para desarrollar estrategias de defensa espec\u00edficas y mitigar las amenazas actuales.<\/li>\n\n\n\n<li><strong>Inteligencia operacional<\/strong> Ofrece informaci\u00f3n detallada sobre ataques o campa\u00f1as espec\u00edficos, lo que ayuda a los equipos de seguridad a responder con rapidez. Este tipo de inteligencia se centra en comprender los m\u00e9todos, las motivaciones y los objetivos de los atacantes.<\/li>\n\n\n\n<li><strong>Inteligencia t\u00e9cnica<\/strong> Es la forma m\u00e1s granular, centr\u00e1ndose en los indicadores t\u00e9cnicos exactos de un ataque, como firmas de malware, direcciones IP infectadas y patrones de correo electr\u00f3nico de phishing. Lo utilizan principalmente profesionales de TI y ciberseguridad para identificar y neutralizar amenazas en tiempo real.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-d6ffed7cc2b0c9f8923403046d88dd9f\" id=\"h-lifecycle-of-cyber-threat-intelligence\" style=\"color:#2b7ca4\">Ciclo de vida de la inteligencia sobre ciberamenazas<\/h2>\n\n\n\n<p>La inteligencia sobre ciberamenazas no es un proceso \u00fanico, sino un ciclo continuo. El ciclo de vida de la inteligencia consta de varias etapas:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Recopilaci\u00f3n<\/strong>Los equipos de seguridad recopilan datos de diversas fuentes, incluidos registros internos, fuentes externas y proveedores de inteligencia sobre amenazas.<\/li>\n\n\n\n<li><strong>An\u00e1lisis<\/strong>Los datos recopilados se analizan para identificar patrones y posibles amenazas. Este an\u00e1lisis suele implicar sistemas basados en IA que pueden detectar anomal\u00edas con mayor rapidez que los m\u00e9todos tradicionales.<\/li>\n\n\n\n<li><strong>Diseminaci\u00f3n<\/strong>Los resultados del an\u00e1lisis se comparten con los equipos relevantes de la organizaci\u00f3n. La informaci\u00f3n est\u00e1 adaptada a ejecutivos, equipos de seguridad y personal de TI, lo que garantiza su aplicaci\u00f3n pr\u00e1ctica en todos los niveles.<\/li>\n\n\n\n<li><strong>Retroalimentaci\u00f3n y refinamiento<\/strong>A medida que surgen nuevas amenazas y evolucionan las t\u00e1cticas de ataque, el ciclo de inteligencia contin\u00faa. La retroalimentaci\u00f3n de los equipos de seguridad ayuda a refinar el proceso, garantizando que el sistema se mantenga actualizado y relevante.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-eb42d323b48926e753a4d9883aa03bbe\" id=\"h-how-cti-supports-web-security-and-bot-protection\" style=\"color:#2b7ca4\">C\u00f3mo CTI apoya la seguridad web y la protecci\u00f3n contra bots<\/h2>\n\n\n\n<p>La Inteligencia de Amenazas Cibern\u00e9ticas (CTI) desempe\u00f1a un papel fundamental en la mejora de la seguridad web y la protecci\u00f3n contra amenazas automatizadas como los bots. Los ciberdelincuentes utilizan bots para ataques como el robo de credenciales, el raspado de contenido y los ataques DDoS. Al integrar la CTI en la seguridad web, las empresas pueden anticiparse a los ataques de bots y mantener sus defensas actualizadas contra nuevas estrategias.<\/p>\n\n\n\n<p>Por ejemplo, <strong>captcha.eu<\/strong>, a <a href=\"http:\/\/captcha.eu\">Soluci\u00f3n CAPTCHA que cumple con la privacidad<\/a>Puede ayudar a proteger los sitios web de bots. Mediante el uso de medidas avanzadas de protecci\u00f3n contra bots basadas en CTI, los sitios web pueden diferenciar entre el tr\u00e1fico humano y automatizado, bloqueando bots maliciosos antes de que causen da\u00f1os.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color has-large-font-size wp-elements-72de50b6cabed51cc3dd00d967bab9d4\" id=\"h-conclusion\" style=\"color:#2b7ca4\">Conclusi\u00f3n<\/h2>\n\n\n\n<p>El panorama de las ciberamenazas cambia constantemente, y anticiparse a los atacantes requiere una vigilancia constante. La Inteligencia de Ciberamenazas permite a las empresas anticiparse a las amenazas en lugar de simplemente reaccionar ante ellas. A medida que los ciberdelincuentes evolucionan sus t\u00e1cticas, el uso de la CTI para guiar su estrategia de defensa garantiza que su empresa est\u00e9 preparada para cualquier amenaza futura.<\/p>\n\n\n\n<p>Seleccionar la plataforma CTI adecuada es clave para obtener informaci\u00f3n pr\u00e1ctica sobre su panorama de amenazas \u00fanico. Elija soluciones que se integren con sus sistemas, aprovechen la automatizaci\u00f3n y presenten los datos con claridad. Implementar Inteligencia de Ciberamenazas refuerza la seguridad, minimiza el riesgo y reduce los costos.<\/p>\n\n\n\n<p>Como parte de una estrategia de seguridad integral, las empresas tambi\u00e9n deber\u00edan considerar soluciones avanzadas de protecci\u00f3n contra bots. <strong><a href=\"http:\/\/captcha.eu\">captcha.eu<\/a><\/strong> ofrece un sistema CAPTCHA f\u00e1cil de usar y compatible con GDPR que ayuda a prevenir ataques de bots, garantizando que su sitio web se mantenga seguro contra amenazas y abusos automatizados.<\/p>\n\n\n\n<div class=\"wp-block-group has-background-color has-text-color has-background has-link-color wp-elements-f0053231231cbd97b0464e4db5840e87 is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-4b2eccd6 wp-block-group-is-layout-flex\" style=\"border-radius:20px;background-color:#f0faf3\">\n<h2 class=\"wp-block-heading has-foreground-color has-text-color has-link-color has-large-font-size wp-elements-b5699e1a129fe1a30ab792feee8ae242\"><strong>100 solicitudes gratuitas<\/strong><\/h2>\n\n\n\n<p class=\"has-foreground-color has-text-color has-link-color wp-elements-b49cc1b9513f565de22aa575e471cab2\">Tiene la oportunidad de probar y testar nuestro producto con 100 solicitudes gratuitas.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.captcha.eu\/dashboard\" style=\"background-color:#77af84\">Iniciar prueba<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-background-color has-text-color has-background has-link-color wp-elements-4bb8247ecf5a95245d0549e230826cba is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-4b2eccd6 wp-block-group-is-layout-flex\" style=\"border-radius:20px;background-color:#eaf7fe;min-height:370px\">\n<p class=\"has-foreground-color has-text-color has-link-color has-normal-font-size wp-elements-51654aed26531fa155b98ad6415b1916\"><strong>Si tiene alguna pregunta<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-foreground-color has-text-color has-link-color has-large-font-size wp-elements-e59e3a3509d5b3902d206fdd19850087\" id=\"h-contact-us\"><strong>P\u00f3ngase en contacto con nosotros<\/strong><\/h2>\n\n\n\n<p class=\"has-foreground-color has-text-color has-link-color wp-elements-fcf79fe91cb9ca380d018fbc64fff9e1\">Nuestro equipo de asistencia est\u00e1 a su disposici\u00f3n para ayudarle.<br><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-foreground-color has-text-color has-background wp-element-button\" href=\"javascript:goToContact();\" style=\"background-color:#81bfe7\">P\u00f3ngase en contacto con nosotros<\/a><\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Todas las empresas, independientemente de su tama\u00f1o, se enfrentan al riesgo de las ciberamenazas. En un mundo en el que los ataques pueden venir de cualquier parte y en cualquier momento, comprender y anticiparse a estas amenazas es crucial para proteger los datos, los sistemas y la reputaci\u00f3n de su organizaci\u00f3n. Aqu\u00ed es donde entra en juego la Inteligencia sobre Ciberamenazas (CTI). En lugar de limitarse a reaccionar ante las amenazas despu\u00e9s...<\/p>","protected":false},"author":1,"featured_media":2124,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[41],"tags":[],"class_list":["post-2123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base"],"acf":{"pretitle":"","intern_slug":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.3 (Yoast SEO v24.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Threat Intelligence (CTI) \u00bb Protect Your Business Proactively<\/title>\n<meta name=\"description\" content=\"What is CTI? \u279c Understand threats \u2713 Anticipate attacks \u2713 Strengthen web security \u2713 Learn how CTI protects your business proactively!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/new.captcha.eu\/es\/que-es-la-inteligencia-de-amenazas-ciberneticas-cti\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cyber Threat Intelligence (CTI)?\" \/>\n<meta property=\"og:description\" content=\"What is CTI? \u279c Understand threats \u2713 Anticipate attacks \u2713 Strengthen web security \u2713 Learn how CTI protects your business proactively!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.captcha.eu\/es\/que-es-la-inteligencia-de-amenazas-ciberneticas-cti\/\" \/>\n<meta property=\"og:site_name\" content=\"captcha.eu\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-29T12:36:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-30T09:00:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Captcha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@captcha_eu\" \/>\n<meta name=\"twitter:site\" content=\"@captcha_eu\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Captcha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/\"},\"author\":{\"name\":\"Captcha\",\"@id\":\"https:\/\/new.captcha.eu\/#\/schema\/person\/f1e4886cdd0c5bbbb44279dd0d95445a\"},\"headline\":\"What is Cyber Threat Intelligence (CTI)?\",\"datePublished\":\"2025-04-29T12:36:10+00:00\",\"dateModified\":\"2025-04-30T09:00:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/\"},\"wordCount\":1100,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/new.captcha.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png\",\"articleSection\":[\"Knowledge Base\"],\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#respond\"]}],\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/\",\"url\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/\",\"name\":\"Cyber Threat Intelligence (CTI) \u00bb Protect Your Business Proactively\",\"isPartOf\":{\"@id\":\"https:\/\/new.captcha.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png\",\"datePublished\":\"2025-04-29T12:36:10+00:00\",\"dateModified\":\"2025-04-30T09:00:27+00:00\",\"description\":\"What is CTI? \u279c Understand threats \u2713 Anticipate attacks \u2713 Strengthen web security \u2713 Learn how CTI protects your business proactively!\",\"breadcrumb\":{\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#primaryimage\",\"url\":\"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png\",\"contentUrl\":\"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png\",\"width\":1920,\"height\":1080,\"caption\":\"captcha.eu\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/new.captcha.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cyber Threat Intelligence (CTI)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/new.captcha.eu\/#website\",\"url\":\"https:\/\/new.captcha.eu\/\",\"name\":\"captcha.eu\",\"description\":\"The GDPR-compliant message protection | captcha.eu\",\"publisher\":{\"@id\":\"https:\/\/new.captcha.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/new.captcha.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/new.captcha.eu\/#organization\",\"name\":\"captcha.eu\",\"url\":\"https:\/\/new.captcha.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/new.captcha.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.captcha.eu\/wp-content\/uploads\/2024\/02\/Captcha_mono-C_Logo.svg\",\"contentUrl\":\"https:\/\/www.captcha.eu\/wp-content\/uploads\/2024\/02\/Captcha_mono-C_Logo.svg\",\"width\":24,\"height\":28,\"caption\":\"captcha.eu\"},\"image\":{\"@id\":\"https:\/\/new.captcha.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/captcha_eu\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/new.captcha.eu\/#\/schema\/person\/f1e4886cdd0c5bbbb44279dd0d95445a\",\"name\":\"Captcha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/new.captcha.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/48b669a092d552f5f30202f8da848c93fa4c54f8c2b3167568ed5cbccbe4994a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/48b669a092d552f5f30202f8da848c93fa4c54f8c2b3167568ed5cbccbe4994a?s=96&d=mm&r=g\",\"caption\":\"Captcha\"},\"sameAs\":[\"https:\/\/www.captcha.eu\"],\"url\":\"https:\/\/new.captcha.eu\/es\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence (CTI) \u00bb Protect Your Business Proactively","description":"What is CTI? \u279c Understand threats \u2713 Anticipate attacks \u2713 Strengthen web security \u2713 Learn how CTI protects your business proactively!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/new.captcha.eu\/es\/que-es-la-inteligencia-de-amenazas-ciberneticas-cti\/","og_locale":"es_ES","og_type":"article","og_title":"What is Cyber Threat Intelligence (CTI)?","og_description":"What is CTI? \u279c Understand threats \u2713 Anticipate attacks \u2713 Strengthen web security \u2713 Learn how CTI protects your business proactively!","og_url":"https:\/\/new.captcha.eu\/es\/que-es-la-inteligencia-de-amenazas-ciberneticas-cti\/","og_site_name":"captcha.eu","article_published_time":"2025-04-29T12:36:10+00:00","article_modified_time":"2025-04-30T09:00:27+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png","type":"image\/png"}],"author":"Captcha","twitter_card":"summary_large_image","twitter_creator":"@captcha_eu","twitter_site":"@captcha_eu","twitter_misc":{"Written by":"Captcha","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#article","isPartOf":{"@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/"},"author":{"name":"Captcha","@id":"https:\/\/new.captcha.eu\/#\/schema\/person\/f1e4886cdd0c5bbbb44279dd0d95445a"},"headline":"What is Cyber Threat Intelligence (CTI)?","datePublished":"2025-04-29T12:36:10+00:00","dateModified":"2025-04-30T09:00:27+00:00","mainEntityOfPage":{"@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/"},"wordCount":1100,"commentCount":0,"publisher":{"@id":"https:\/\/new.captcha.eu\/#organization"},"image":{"@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#primaryimage"},"thumbnailUrl":"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png","articleSection":["Knowledge Base"],"inLanguage":"es-ES","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#respond"]}],"accessibilityFeature":["tableOfContents"]},{"@type":"WebPage","@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/","url":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/","name":"Cyber Threat Intelligence (CTI) \u00bb Protect Your Business Proactively","isPartOf":{"@id":"https:\/\/new.captcha.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#primaryimage"},"image":{"@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#primaryimage"},"thumbnailUrl":"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png","datePublished":"2025-04-29T12:36:10+00:00","dateModified":"2025-04-30T09:00:27+00:00","description":"What is CTI? \u279c Understand threats \u2713 Anticipate attacks \u2713 Strengthen web security \u2713 Learn how CTI protects your business proactively!","breadcrumb":{"@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#primaryimage","url":"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png","contentUrl":"https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png","width":1920,"height":1080,"caption":"captcha.eu"},{"@type":"BreadcrumbList","@id":"https:\/\/new.captcha.eu\/what-is-cyber-threat-intelligence-cti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.captcha.eu\/"},{"@type":"ListItem","position":2,"name":"What is Cyber Threat Intelligence (CTI)?"}]},{"@type":"WebSite","@id":"https:\/\/new.captcha.eu\/#website","url":"https:\/\/new.captcha.eu\/","name":"captcha.eu","description":"The GDPR-compliant message protection | captcha.eu","publisher":{"@id":"https:\/\/new.captcha.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.captcha.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/new.captcha.eu\/#organization","name":"captcha.eu","url":"https:\/\/new.captcha.eu\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/new.captcha.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.captcha.eu\/wp-content\/uploads\/2024\/02\/Captcha_mono-C_Logo.svg","contentUrl":"https:\/\/www.captcha.eu\/wp-content\/uploads\/2024\/02\/Captcha_mono-C_Logo.svg","width":24,"height":28,"caption":"captcha.eu"},"image":{"@id":"https:\/\/new.captcha.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/captcha_eu"]},{"@type":"Person","@id":"https:\/\/new.captcha.eu\/#\/schema\/person\/f1e4886cdd0c5bbbb44279dd0d95445a","name":"Captcha","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/new.captcha.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/48b669a092d552f5f30202f8da848c93fa4c54f8c2b3167568ed5cbccbe4994a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/48b669a092d552f5f30202f8da848c93fa4c54f8c2b3167568ed5cbccbe4994a?s=96&d=mm&r=g","caption":"Captcha"},"sameAs":["https:\/\/www.captcha.eu"],"url":"https:\/\/new.captcha.eu\/es\/author\/admin\/"}]}},"pbg_featured_image_src":{"full":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",1920,1080,false],"thumbnail":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30-150x150.png",150,150,true],"medium":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30-300x169.png",300,169,true],"medium_large":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30-768x432.png",768,432,true],"large":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30-1024x576.png",1024,576,true],"saasland_370x300":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_85x70":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",85,48,false],"saasland_228x405":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",228,128,false],"saasland_370x280":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_370x700":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_370x190":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",338,190,false],"saasland_80x80":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",80,45,false],"saasland_70x70":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",70,39,false],"saasland_83x88":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",83,47,false],"saasland_100x100":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",100,56,false],"saasland_85x90":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",85,48,false],"saasland_960x500":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",889,500,false],"saasland_370x400":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_270x350":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",270,152,false],"saasland_570x400":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",570,321,false],"saasland_640x450":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",640,360,false],"saasland_480x450":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",480,270,false],"saasland_240x220":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",240,135,false],"saasland_240x250":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",240,135,false],"saasland_450x420":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",450,253,false],"saasland_80x90":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",80,45,false],"saasland_350x360":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",350,197,false],"saasland_350x400":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",350,197,false],"saasland_370x440":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_560x400":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",560,315,false],"saasland_370x320":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_250x320":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_270x330":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",270,152,false],"saasland_700x480":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",700,394,false],"saasland_370x480":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_1170x675":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",1170,658,false],"saasland_370x418":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_480x480":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",480,270,false],"saasland_634x480":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",634,357,false],"saasland_960x670":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",960,540,false],"saasland_470x520":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",470,264,false],"saasland_670x670":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",670,377,false],"saasland_370x370":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_170x120":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",170,96,false],"saasland_285x350":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",285,160,false],"1536x1536":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",1536,864,false],"2048x2048":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",1920,1080,false],"trp-custom-language-flag":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",18,10,false],"saasland_370x360":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_770x480":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",770,433,false],"saasland_570x340":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",570,321,false],"saasland_110x80":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",110,62,false],"saasland_800x400":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",711,400,false],"saasland_455x600":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",455,256,false],"saasland_520x300":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",520,293,false],"saasland_75x75":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",75,42,false],"saasland_240x200":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",240,135,false],"saasland_370x350":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",370,208,false],"saasland_350x365":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",350,197,false],"saasland_670x450":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",670,377,false],"saasland_1170x600":["https:\/\/new.captcha.eu\/wp-content\/uploads\/2025\/04\/Design-ohne-Titel30.png",1067,600,false]},"pbg_author_info":{"display_name":"Captcha","author_link":"https:\/\/new.captcha.eu\/es\/author\/admin\/","author_img":"<img alt='Captcha' src='https:\/\/secure.gravatar.com\/avatar\/48b669a092d552f5f30202f8da848c93fa4c54f8c2b3167568ed5cbccbe4994a?s=128&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/48b669a092d552f5f30202f8da848c93fa4c54f8c2b3167568ed5cbccbe4994a?s=256&#038;d=mm&#038;r=g 2x' class='avatar avatar-128 photo' height='128' width='128' decoding='async'\/>"},"pbg_comment_info":" No Comments","pbg_excerpt":"Every business, regardless of size, faces the risk of cyber threats. In a world where attacks can come from anywhere at any time, understanding and anticipating these threats is crucial for protecting your organization\u2019s data, systems, and reputation. This is where Cyber Threat Intelligence (CTI) comes into play. Rather than just reacting to threats after...","_links":{"self":[{"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/posts\/2123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/comments?post=2123"}],"version-history":[{"count":2,"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/posts\/2123\/revisions"}],"predecessor-version":[{"id":2158,"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/posts\/2123\/revisions\/2158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/media\/2124"}],"wp:attachment":[{"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/media?parent=2123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/categories?post=2123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.captcha.eu\/es\/wp-json\/wp\/v2\/tags?post=2123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}