{"id":85533,"date":"2020-05-12T09:26:52","date_gmt":"2020-05-12T07:26:52","guid":{"rendered":"https:\/\/territorialchallenges.com\/?p=85533"},"modified":"2020-05-12T09:26:52","modified_gmt":"2020-05-12T07:26:52","slug":"industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee","status":"publish","type":"post","link":"https:\/\/territorialchallenges.com\/es\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","title":{"rendered":"Industria 4.0: Ciberseguridad para una industria manufacturera redise\u00f1ada"},"content":{"rendered":"<p>Los sistemas inform\u00e1ticos heredados vinculados a las nuevas conexiones han mostrado vulnerabilidades en las instalaciones de las industrias del futuro. Es posible que los ciberataques no sean una prioridad para los instaladores de software al considerar los riesgos que enfrentan los fabricantes que son clientes. En cambio, los instaladores podr\u00edan gravitar\u2026 <\/p>\n<div class=\"pmpro_content_message\">Art\u00edculo disponible s\u00f3lo para suscriptores.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Acceso<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/es\/wp-login.php\/?action=register\">Registro<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter... <\/p>\n<div class=\"pmpro_content_message\">Art\u00edculo disponible s\u00f3lo para suscriptores.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Acceso<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/es\/wp-login.php\/?action=register\">Registro<\/a><\/div>","protected":false},"author":11,"featured_media":85534,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[17,127],"tags":[],"blocksy_meta":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/territorialchallenges.com\/es\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\" \/>\n<meta property=\"og:description\" content=\"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/territorialchallenges.com\/es\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:site_name\" content=\"Territorial Challenges\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-12T07:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ni.abdi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ni.abdi\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"ni.abdi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"author\":{\"name\":\"ni.abdi\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\"},\"headline\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\",\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"wordCount\":722,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"articleSection\":[\"Industrie 5.0\",\"Actualit\u00e9 Europe\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"url\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/#website\"},\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/territorialchallenges.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/territorialchallenges.com\/#website\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"name\":\"Territorial Challenges\",\"description\":\"Veille Internationale - Strat\u00e9gie Intelligentes - Bonnes pratiques\",\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/territorialchallenges.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/territorialchallenges.com\/#organization\",\"name\":\"Territorial Challenges\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"width\":1832,\"height\":576,\"caption\":\"Territorial Challenges\"},\"image\":{\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\",\"name\":\"ni.abdi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"caption\":\"ni.abdi\"},\"sameAs\":[\"https:\/\/twitter.com\/Ni.abdi\"],\"url\":\"https:\/\/territorialchallenges.com\/es\/author\/ni-abdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/territorialchallenges.com\/es\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_locale":"es_ES","og_type":"article","og_title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","og_description":"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]","og_url":"https:\/\/territorialchallenges.com\/es\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_site_name":"Territorial Challenges","article_published_time":"2020-05-12T07:26:52+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg","type":"image\/jpeg"}],"author":"ni.abdi","twitter_card":"summary_large_image","twitter_creator":"@Ni.abdi","twitter_misc":{"Escrito por":"ni.abdi","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"author":{"name":"ni.abdi","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f"},"headline":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e","datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"wordCount":722,"commentCount":0,"publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"articleSection":["Industrie 5.0","Actualit\u00e9 Europe"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","url":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/#website"},"datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","breadcrumb":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/territorialchallenges.com\/"},{"@type":"ListItem","position":2,"name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/territorialchallenges.com\/#website","url":"https:\/\/territorialchallenges.com\/","name":"Desaf\u00edos territoriales","description":"Monitoreo Internacional - Estrategias Inteligentes - Mejores Pr\u00e1cticas","publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/territorialchallenges.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/territorialchallenges.com\/#organization","name":"Desaf\u00edos territoriales","url":"https:\/\/territorialchallenges.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/","url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","contentUrl":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","width":1832,"height":576,"caption":"Territorial Challenges"},"image":{"@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f","name":"ni.abdi","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","caption":"ni.abdi"},"sameAs":["https:\/\/twitter.com\/Ni.abdi"],"url":"https:\/\/territorialchallenges.com\/es\/author\/ni-abdi\/"}]}},"_links":{"self":[{"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/posts\/85533"}],"collection":[{"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/comments?post=85533"}],"version-history":[{"count":1,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/posts\/85533\/revisions"}],"predecessor-version":[{"id":85538,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/posts\/85533\/revisions\/85538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/media\/85534"}],"wp:attachment":[{"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/media?parent=85533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/categories?post=85533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/tags?post=85533"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}