{"id":32179,"date":"2026-03-03T11:06:55","date_gmt":"2026-03-03T10:06:55","guid":{"rendered":"https:\/\/mrknights.com\/riesgo-para-el-secreto-industrial-lo-que-el-incidente-de-las-gafas-inteligentes-revela-en-la-industria-aeroespacial-francesa\/"},"modified":"2026-03-03T11:39:22","modified_gmt":"2026-03-03T10:39:22","slug":"riesgo-para-el-secreto-industrial-lo-que-el-incidente-de-las-gafas-inteligentes-revela-en-la-industria-aeroespacial-francesa","status":"publish","type":"post","link":"https:\/\/mrknights.com\/es\/riesgo-para-el-secreto-industrial-lo-que-el-incidente-de-las-gafas-inteligentes-revela-en-la-industria-aeroespacial-francesa\/","title":{"rendered":"Riesgo para el secreto industrial: lo que el incidente de las gafas inteligentes revela en la industria aeroespacial francesa"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"32179\" class=\"elementor elementor-32179 elementor-32168\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b5fabc5 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"7b5fabc5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t<div class=\"elementor-element elementor-element-3a04835d e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"3a04835d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-70b087ec flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-template-post-title\" data-id=\"70b087ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-template-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"thegem-te-post-title\"> <h1 class=\"post-title \"> <span>Riesgo para el secreto industrial: lo que el incidente de las gafas inteligentes revela en la industria aeroespacial francesa<\/span> <\/h1> <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cf7fa4a flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-icon\" data-id=\"5cf7fa4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;thegem_elementor_preset&quot;:&quot;circle&quot;}\" data-widget_type=\"thegem-icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"centered-box icon-inline-position\">\n\n\t\t\t\t<a role=\"button\" aria-label=\"Read more\">\n\n\t\t\t\t<div class=\"gem-icon gem-icon-pack-fontawesome gem-icon-size-small  gem-icon-shape-circle \">\n\n\t\t\t\t\n\t\t\t\t<div class=\"gem-icon-inner\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"padding-box-inner\">\n\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t<span class=\"gem-icon-half-1\"><span class=\"back-angle\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-mdi mdi-checkbox-blank-circle\"><\/i>\t\t\t\t\t<\/span><\/span>\n\t\t\t\t\t<span class=\"gem-icon-half-2\"><span class=\"back-angle\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-mdi mdi-checkbox-blank-circle\"><\/i>\t\t\t\t\t<\/span><\/span>\n\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3eae041f e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"3eae041f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-603dd638 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"603dd638\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-3af4e6c4 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"3af4e6c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>El reciente incidente relacionado con el uso de gafas inteligentes por parte de un trabajador temporal en la industria aeroespacial francesa vuelve a plantear una pregunta inc\u00f3moda pero necesaria: \u00bfhasta qu\u00e9 punto est\u00e1n realmente preparadas las organizaciones para proteger el secreto industrial? [1][2] <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a3e8c9 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"4a3e8c9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-d9e3f6a flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"d9e3f6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-d9e3f6a\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Una<\/span> <span class=\"thegem-heading-word\">percepci\u00f3n<\/span> <span class=\"thegem-heading-word\">incompleta<\/span> <span class=\"thegem-heading-word\">de<\/span> <span class=\"thegem-heading-word\">la<\/span> <span class=\"thegem-heading-word\">ciberseguridad<\/span><\/h2><style type=\"text\/css\">#thegem-heading-d9e3f6a {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-39df9f3 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"39df9f3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-ffa26fb elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"ffa26fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>La ciberseguridad moderna a menudo se imagina como un campo de batalla tecnol\u00f3gico: ataques sofisticados, intrusiones remotas o grupos organizados que intentan vulnerar infraestructuras cr\u00edticas. Sin embargo, algunos de los riesgos m\u00e1s significativos de hoy en d\u00eda no necesariamente provienen de acciones externas maliciosas, sino de situaciones operativas cotidianas dentro de las propias organizaciones. <\/p><p>Un incidente reciente informado por medios internacionales, ocurrido en una instalaci\u00f3n industrial aeroespacial francesa vinculada al sector de defensa, ilustra claramente esta realidad. Seg\u00fan informaci\u00f3n disponible p\u00fablicamente, se detect\u00f3 a un trabajador temporal usando gafas inteligentes capaces de capturar im\u00e1genes dentro de un \u00e1rea de producci\u00f3n sensible en una instalaci\u00f3n de Dassault Aviation, asociada con el ensamblaje del avi\u00f3n de combate Rafale [1][3]. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-490d40a elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"490d40a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Seg\u00fan inform\u00f3 Reuters, citando fuentes judiciales francesas, el trabajador fue detenido para verificar si se hab\u00eda producido una posible violaci\u00f3n de los intereses fundamentales de la naci\u00f3n. Medios nacionales como Le Monde tambi\u00e9n cubrieron el caso, indicando que las autoridades activaron protocolos de seguridad y realizaron ex\u00e1menes t\u00e9cnicos del dispositivo. Las verificaciones posteriores indicaron que no se hab\u00eda establecido ning\u00fan espionaje ni transmisi\u00f3n de informaci\u00f3n estrat\u00e9gica desde el interior de la instalaci\u00f3n. No obstante, el episodio provoc\u00f3 una respuesta institucional inmediata, demostrando el nivel de sensibilidad asociado a los entornos industriales vinculados al sector de defensa.   <\/p><p>La verdadera cuesti\u00f3n no es si exist\u00eda intenci\u00f3n maliciosa. La pregunta es: \u00bfPor qu\u00e9 fue posible que existiera el riesgo? <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c727ea3 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"4c727ea3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-20a32d00 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"20a32d00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-20a32d00\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">El<\/span> <span class=\"thegem-heading-word\">cambio<\/span> <span class=\"thegem-heading-word\">silencioso<\/span> <span class=\"thegem-heading-word\">en<\/span> <span class=\"thegem-heading-word\">la<\/span> <span class=\"thegem-heading-word\">superficie<\/span> <span class=\"thegem-heading-word\">de<\/span> <span class=\"thegem-heading-word\">exposici\u00f3n<\/span> <span class=\"thegem-heading-word\">industrial<\/span><\/h2><style type=\"text\/css\">#thegem-heading-20a32d00 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2846380c e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"2846380c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-37389d10 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"37389d10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Durante a\u00f1os, los modelos de seguridad industrial se han construido sobre una premisa clara: proteger los sistemas inform\u00e1ticos, controlar el acceso f\u00edsico y limitar la extracci\u00f3n de informaci\u00f3n sensible. Ese modelo sigue siendo necesario, pero ya no es suficiente. <\/p><p>Hoy en d\u00eda, los dispositivos cotidianos incorporan capacidades que hace apenas una d\u00e9cada estaban reservadas para equipos especializados [4]:<\/p><ul><li>Grabaci\u00f3n de video continua,<\/li><li>Captura discreta de im\u00e1genes,<\/li><li>Almacenamiento autom\u00e1tico,<\/li><li>Sincronizaci\u00f3n con servicios en la nube,<\/li><li>Transmisi\u00f3n de datos casi instant\u00e1nea.<\/li><\/ul>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30b659a6 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"30b659a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Las gafas inteligentes, los relojes conectados o los asistentes digitales personales introducen una nueva categor\u00eda de riesgo: sensores permanentes dentro del entorno operativo. El desaf\u00edo ya no radica \u00fanicamente en qui\u00e9n accede a una instalaci\u00f3n, sino en qu\u00e9 tecnolog\u00eda entra junto con esa persona. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-384d99e0 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"384d99e0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-3e0e86cf flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"3e0e86cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-3e0e86cf\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">No<\/span> <span class=\"thegem-heading-word\">se<\/span> <span class=\"thegem-heading-word\">trata<\/span> <span class=\"thegem-heading-word\">de<\/span> <span class=\"thegem-heading-word\">un<\/span> <span class=\"thegem-heading-word\">fallo<\/span> <span class=\"thegem-heading-word\">t\u00e9cnico.<\/span> <span class=\"thegem-heading-word\">Es<\/span> <span class=\"thegem-heading-word\">un<\/span> <span class=\"thegem-heading-word\">fallo<\/span> <span class=\"thegem-heading-word\">administrativo.<\/span> <\/h2><style type=\"text\/css\">#thegem-heading-3e0e86cf {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d852dc e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"3d852dc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-5bf0d129 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"5bf0d129\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Desde la perspectiva profesional de la ciberseguridad y la gesti\u00f3n de riesgos, estas situaciones rara vez corresponden a una violaci\u00f3n tecnol\u00f3gica cl\u00e1sica. Son, ante todo, una cuesti\u00f3n de seguridad administrativa y gobernanza interna. <\/p><p>Entre los factores estructurales que suelen estar involucrados se encuentran:<\/p><ul><li>Pol\u00edticas insuficientemente adaptadas a los dispositivos inteligentes personales,<\/li><li>Procesos de incorporaci\u00f3n acelerados para personal temporal o externo,<\/li><li>Falta de una clasificaci\u00f3n clara de los objetos electr\u00f3nicos autorizados,<\/li><li>Controles f\u00edsicos dise\u00f1ados para amenazas tradicionales,<\/li><li>Conciencia limitada y espec\u00edfica sobre los riesgos de captura pasiva de informaci\u00f3n.<\/li><\/ul>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-215fbd elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"215fbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>En otras palabras, el sistema puede funcionar correctamente desde el punto de vista t\u00e9cnico y, aun as\u00ed, permitir una exposici\u00f3n no deseada. Esto no implica negligencia individual ni institucional. M\u00e1s bien, refleja la rapidez con la que evoluciona la tecnolog\u00eda en comparaci\u00f3n con los marcos organizativos existentes.  <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f9945fc e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"2f9945fc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-657ae199 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"657ae199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-657ae199\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">El<\/span> <span class=\"thegem-heading-word\">factor<\/span> <span class=\"thegem-heading-word\">humano<\/span> <span class=\"thegem-heading-word\">ampliado<\/span><\/h2><style type=\"text\/css\">#thegem-heading-657ae199 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33de8f59 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"33de8f59\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-4b0a894b elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"4b0a894b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Durante a\u00f1os, he sostenido que el factor humano representa el eslab\u00f3n m\u00e1s vulnerable en la seguridad. Hoy, esa afirmaci\u00f3n requiere una aclaraci\u00f3n importante. El problema no es la persona. El problema es que cada persona ahora lleva m\u00faltiples extensiones tecnol\u00f3gicas capaces de registrar informaci\u00f3n sin fricci\u00f3n perceptible [5].   <\/p><p>Un trabajador puede ingresar a un entorno sensible sin ninguna intenci\u00f3n de violar las normas y, sin embargo, introducir un posible vector de exposici\u00f3n industrial. Este fen\u00f3meno se vuelve especialmente relevante en sectores estrat\u00e9gicos como: <\/p><ul><li>Aeroespacial,<\/li><li>Defensa,<\/li><li>Energ\u00eda nuclear,<\/li><li>Transporte,<\/li><li>Infraestructuras cr\u00edticas,<\/li><li>Industrias de alta tecnolog\u00eda.<\/li><\/ul>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1db889da elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"1db889da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>En estos entornos, la protecci\u00f3n no es solo una cuesti\u00f3n de inter\u00e9s corporativo, sino tambi\u00e9n de soberan\u00eda tecnol\u00f3gica y consideraciones de seguridad nacional [6].<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9db2545 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"9db2545\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-233883be flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"233883be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-233883be\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Secreto<\/span> <span class=\"thegem-heading-word\">industrial<\/span> <span class=\"thegem-heading-word\">y<\/span> <span class=\"thegem-heading-word\">responsabilidad<\/span> <span class=\"thegem-heading-word\">organizativa<\/span><\/h2><style type=\"text\/css\">#thegem-heading-233883be {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3732b4d6 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"3732b4d6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-5086a209 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"5086a209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>La legislaci\u00f3n europea reconoce la protecci\u00f3n de los secretos comerciales e industriales como un elemento esencial de la competitividad econ\u00f3mica. En Francia, esta protecci\u00f3n est\u00e1 particularmente estructurada a trav\u00e9s de la legislaci\u00f3n relacionada con el \u201csecret des affaires\u201d, derivada de la Directiva (UE) 2016\/943 sobre la protecci\u00f3n del know-how y la informaci\u00f3n empresarial no divulgada (secretos comerciales) [7]. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-543c376c elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"543c376c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Es importante enfatizar que la mera existencia de un riesgo potencial puede ser suficiente para activar procedimientos internos o verificaciones, incluso en ausencia de da\u00f1os comprobados.<\/p><p>Esto confirma una evoluci\u00f3n significativa: la seguridad ya no se limita a reaccionar ante incidentes, sino a prevenir escenarios de exposici\u00f3n plausibles. La gesti\u00f3n moderna de riesgos industriales requiere tanto anticipaci\u00f3n administrativa como protecci\u00f3n tecnol\u00f3gica. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b9ade01 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"3b9ade01\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-446cbcb3 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"446cbcb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-446cbcb3\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Una<\/span> <span class=\"thegem-heading-word\">se\u00f1al<\/span> <span class=\"thegem-heading-word\">para<\/span> <span class=\"thegem-heading-word\">todas<\/span> <span class=\"thegem-heading-word\">las<\/span> <span class=\"thegem-heading-word\">organizaciones,<\/span> <span class=\"thegem-heading-word\">no<\/span> <span class=\"thegem-heading-word\">solo<\/span> <span class=\"thegem-heading-word\">para<\/span> <span class=\"thegem-heading-word\">la<\/span> <span class=\"thegem-heading-word\">industria<\/span> <span class=\"thegem-heading-word\">de<\/span> <span class=\"thegem-heading-word\">defensa<\/span><\/h2><style type=\"text\/css\">#thegem-heading-446cbcb3 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bcf382c e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"6bcf382c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-13b978fe elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"13b978fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Ser\u00eda un error interpretar este tipo de incidente como exclusivo de grandes grupos industriales o entornos militares. La misma l\u00f3gica se replica, a diferentes escalas, en: <\/p><ul><li>Empresas profesionales,<\/li><li>Centros de salud,<\/li><li>Empresas de tecnolog\u00eda,<\/li><li>Firmas de consultor\u00eda,<\/li><li>Startups,<\/li><li>Administraciones p\u00fablicas.<\/li><\/ul>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cff453f elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"7cff453f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Cualquier organizaci\u00f3n que maneje informaci\u00f3n sensible se enfrenta ahora al mismo desaf\u00edo: la convergencia entre dispositivos personales y espacios profesionales.<\/p><p>La cuesti\u00f3n estrat\u00e9gica, por lo tanto, cambia de: \u00bfEstamos protegidos contra ataques externos? a: \u00bfEst\u00e1n nuestros procesos internos preparados para tecnolog\u00edas que evolucionan m\u00e1s r\u00e1pido que nuestras pol\u00edticas? <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30bfbe10 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"30bfbe10\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t<div class=\"elementor-element elementor-element-76b996d6 e-con-full thegem-e-con-layout-thegem e-flex elementor-invisible e-con e-child\" data-id=\"76b996d6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;bounceInLeft&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6057b76b e-con-full thegem-e-con-layout-thegem e-flex elementor-invisible e-con e-child\" data-id=\"6057b76b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;bounceInRight&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-47fb419e flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"47fb419e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"thegem-heading thegem-animated-heading title-h4\" id=\"thegem-heading-47fb419e\"><span class=\"colored\" style=\"color: #333333;\">Experiencia en ciberseguridad y redes<\/span> <\/span><style type=\"text\/css\">#thegem-heading-47fb419e {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bb6e2f7 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"1bb6e2f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Somos una empresa de innovaci\u00f3n tecnol\u00f3gica especializada en ciberseguridad, redes inform\u00e1ticas y soluciones digitales avanzadas. A trav\u00e9s de auditor\u00edas, consultor\u00edas y dise\u00f1o, desarrollamos y gestionamos infraestructuras cr\u00edticas, combinando experiencia t\u00e9cnica, certificaciones internacionales y metodolog\u00edas de investigaci\u00f3n y desarrollo de vanguardia. <\/p><p>Nuestro equipo multidisciplinario integra ingenier\u00eda, an\u00e1lisis de riesgos, auditor\u00eda y desarrollo de sistemas para ofrecer soluciones integrales y adaptadas a entornos complejos. Cada proyecto se aborda con rigor t\u00e9cnico, precisi\u00f3n y un enfoque orientado a la resiliencia, la eficiencia y la seguridad operativa. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35fd3ed4 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"35fd3ed4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-15e0997d flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"15e0997d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-15e0997d\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">La<\/span> <span class=\"thegem-heading-word\">ciberseguridad<\/span> <span class=\"thegem-heading-word\">como<\/span> <span class=\"thegem-heading-word\">funci\u00f3n<\/span> <span class=\"thegem-heading-word\">corporativa<\/span> <span class=\"thegem-heading-word\">estructural<\/span><\/h2><style type=\"text\/css\">#thegem-heading-15e0997d {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-527957b6 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"527957b6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-1d5f3922 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"1d5f3922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Hoy en d\u00eda, la ciberseguridad no es simplemente un asunto t\u00e9cnico. Forma parte estructural de la organizaci\u00f3n, al igual que la administraci\u00f3n o la contabilidad, porque impacta directamente en la continuidad operativa, la confianza y la sostenibilidad de la actividad econ\u00f3mica. Los incidentes contempor\u00e1neos rara vez comienzan con una intrusi\u00f3n espectacular. A menudo se originan en zonas grises operativas donde la tecnolog\u00eda cotidiana supera silenciosamente los marcos de control existentes.   <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a6c48ad elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"3a6c48ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>La lecci\u00f3n principal no es alarmista; es organizativa. La resiliencia no depende \u00fanicamente de prevenir ataques, sino de comprender c\u00f3mo cambian los riesgos cuando la tecnolog\u00eda deja de estar confinada a los sistemas\u2026 y se integra en las personas. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-664a8cda elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"664a8cda\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d9d6c7a\" data-id=\"3d9d6c7a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4eb17a29 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"4eb17a29\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4c25a051\" data-id=\"4c25a051\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31abef37 elementor-widget__width-initial flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-heading\" data-id=\"31abef37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"title-h6 elementor-heading-title elementor-size-default\">SUSCR\u00cdBETE A NUESTRO BOLET\u00cdN INFORMATIVO<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c110231 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"6c110231\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>* Los datos personales ser\u00e1n cifrados<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65a307af\" data-id=\"65a307af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69f40185 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-mailchimp\" data-id=\"69f40185\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;submit_show_icon&quot;:&quot;yes&quot;,&quot;thegem_elementor_preset&quot;:&quot;default&quot;}\" data-widget_type=\"thegem-mailchimp.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"thegem-mailchimp wpcf7-form  form-69f40185 label-top\">\n\t<section id=\"yikes-mailchimp-container-1\" class=\"yikes-mailchimp-container yikes-mailchimp-container-1 \">\n\t\t\t\t<form id=\"newsletter-11-1\" class=\"yikes-easy-mc-form yikes-easy-mc-form-1 yikes-mailchimp-form-inline  newsletter-11\" method=\"POST\" data-attr-form-id=\"1\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"yikes-easy-mc-form-1-EMAIL\"  class=\"label-inline EMAIL-label yikes-mailchimp-field-required \">\n\n\t\t\t\t\t\t\t\t\t\t<!-- dictate label visibility -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Description Above -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<input id=\"yikes-easy-mc-form-1-EMAIL\"  name=\"EMAIL\"  placeholder=\"Your email address\"  class=\"yikes-easy-mc-email field-no-label\"  required=\"required\" type=\"email\"  value=\"\">\n\n\t\t\t\t\t\t\t\t\t\t<!-- Description Below -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t<!-- Honeypot Trap -->\n\t\t\t\t<input type=\"hidden\" name=\"yikes-mailchimp-honeypot\" id=\"yikes-mailchimp-honeypot-1\" value=\"\">\n\n\t\t\t\t<!-- List ID -->\n\t\t\t\t<input type=\"hidden\" name=\"yikes-mailchimp-associated-list-id\" id=\"yikes-mailchimp-associated-list-id-1\" value=\"536ba249f8\">\n\n\t\t\t\t<!-- The form that is being submitted! Used to display error\/success messages above the correct form -->\n\t\t\t\t<input type=\"hidden\" name=\"yikes-mailchimp-submitted-form\" id=\"yikes-mailchimp-submitted-form-1\" value=\"1\">\n\n\t\t\t\t<!-- Submit Button -->\n\t\t\t\t<label class=\"empty-form-inline-label submit-button-inline-label\"><span class=\"empty-label labels-hidden\">&nbsp;<\/span><button type=\"submit\" class=\"yikes-easy-mc-submit-button yikes-easy-mc-submit-button-1 btn btn-primary  gem-button\"> <span class=\"yikes-mailchimp-submit-button-span-text\"> <\/span><\/button><\/label>\t\t\t\t<!-- Nonce Security Check -->\n\t\t\t\t<input type=\"hidden\" id=\"yikes_easy_mc_new_subscriber_1\" name=\"yikes_easy_mc_new_subscriber\" value=\"3b702e4352\">\n\t\t\t\t<input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/es\/wp-json\/wp\/v2\/posts\/32179\" \/>\n\t\t\t<\/form>\n\t\t\t<!-- Mailchimp Form generated by Easy Forms for Mailchimp v6.9.0 (https:\/\/wordpress.org\/plugins\/yikes-inc-easy-mailchimp-extender\/) -->\n\n\t\t\t<\/section>\n\t<i aria-hidden=\"true\" class=\"gem-elegant arrow-carrot-right\"><\/i><\/div>\n\t\t<script>\n\t\t\t(function ($) {\n\t\t\t\t$(document).ready(function () {\n\t\t\t\t\tvar icon = $('.thegem-mailchimp.form-69f40185 > i').first();\n\t\t\t\t\tvar icon_svg = $('.thegem-mailchimp.form-69f40185 > svg').first();\n\t\t\t\t\tif (icon.length) {\n\t\t\t\t\t\t$('.thegem-mailchimp.form-69f40185 .yikes-easy-mc-submit-button .space, .thegem-mailchimp.form-69f40185 .yikes-easy-mc-submit-button i').remove();\n\t\t\t\t\t\t$('.thegem-mailchimp.form-69f40185 .yikes-easy-mc-submit-button').prepend('<span class=\"space\"><\/span>').prepend(icon);\n\t\t\t\t\t} else if (icon_svg.length) {\n\t\t\t\t\t\t$('.thegem-mailchimp.form-69f40185 .yikes-easy-mc-submit-button .space, .thegem-mailchimp.form-69f40185 .yikes-easy-mc-submit-button svg').remove();\n\t\t\t\t\t\t$('.thegem-mailchimp.form-69f40185 .yikes-easy-mc-submit-button').prepend('<span class=\"space\"><\/span>').prepend(icon_svg);\n\t\t\t\t\t}\n\t\t\t\t\tvar inputs = $('.thegem-mailchimp.form-69f40185 .label-inline:visible').length;\n\t\t\t\t\tif (inputs > 1) {\n\t\t\t\t\t\t$('.thegem-mailchimp.form-69f40185').addClass('mobile-column');\n\t\t\t\t\t}\n\n\t\t\t\t\tlabelEqualWidth();\n\t\t\t\t});\n\n\t\t\t\tfunction labelEqualWidth() {\n\t\t\t\t\tvar max_width = 0;\n\t\t\t\t\t$('.thegem-mailchimp.form-69f40185.label-left label span').css('width', 'auto');\n\t\t\t\t\t$('.thegem-mailchimp.form-69f40185.label-left label span').each(function () {\n\t\t\t\t\t\tif ($(this).width() > max_width) {\n\t\t\t\t\t\t\tmax_width = $(this).width() + 1;\n\t\t\t\t\t\t}\n\t\t\t\t\t});\n\t\t\t\t\t$('.thegem-mailchimp.form-69f40185.label-left label span').css('width', max_width)\n\t\t\t\t}\n\n\t\t\t\t\t\t\t})(jQuery);\n\t\t<\/script>\n\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<div class=\"elementor-element elementor-element-6892f38 elementor-shape-rounded elementor-grid-0 e-grid-align-center flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-social-icons\" data-id=\"6892f38\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-social-facebook-circle elementor-repeater-item-405f4b4\" href=\"https:\/\/www.facebook.com\/mr.knightsfr\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Social-facebook-circle<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-elegant social-facebook-circle\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-social-instagram-circle elementor-repeater-item-edaba3e\" href=\"http:\/\/mr_knight_s\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Social-instagram-circle<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-elegant social-instagram-circle\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-4109a2f\" href=\"https:\/\/www.linkedin.com\/company\/mr-knight-s\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t<div class=\"elementor-element elementor-element-81f0c79 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"81f0c79\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t<div class=\"elementor-element elementor-element-12c6559a e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"12c6559a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-7f649078 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-wp-widget-recent-comments\" data-id=\"7f649078\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-recent-comments.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5>Comentarios recientes<\/h5><ul id=\"recentcomments\"><li class=\"recentcomments\"><span class=\"comment-author-link\">Douglas<\/span> en <a href=\"https:\/\/mrknights.com\/es\/tus-datos-bancarios-pueden-haber-sido-expuestos-que-ocurrio-tras-el-acceso-a-las-cuentas-ficoba-y-como-podria-afectarte\/#comment-9\">Tus datos bancarios pueden haber sido expuestos: qu\u00e9 ocurri\u00f3 tras el acceso a las cuentas FICOBA y c\u00f3mo podr\u00eda afectarte<\/a><\/li><\/ul>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56f3e43 e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"56f3e43\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f9a7cb2 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"7f9a7cb2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-7f861bfa flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-styled-textbox\" data-id=\"7f861bfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;thegem_elementor_preset&quot;:&quot;basic&quot;}\" data-widget_type=\"thegem-styled-textbox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"gem-textbox styled-textbox-basic\">\n\n\t\n\t\t<div class=\"gem-textbox-top gem-textbox-top-none default-fill\">\n\t\t\t\t\t<\/div>\n\t\n\t<div class=\"gem-textbox-inner\">\n\n\t\t<div class=\"gem-textbox-content default-background icon-top gem-textbox-icon-image-wrapping-none\">\n\n\t\t\t\t\t\t\t<div class=\"gem-texbox-icon-image-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-top \">\n\t\t\t\t\t\t\t<div class=\"gem-textbox-icon\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"tgh-icon book-open\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"gem-texbox-text-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h4 class=\"gem-textbox-title title-h4 bold\">\n\t\t\t\t\t\t\tReferencias\t\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"gem-textbox-description gem-text-output\">\n\t\t\t\t\t\t\t<ol><li>Reuters. (2026). Investigaci\u00f3n abierta tras la detecci\u00f3n de un trabajador temporal con gafas inteligentes en una instalaci\u00f3n aeroespacial francesa. Agencia de Noticias Reuters. <\/li><li>Le Monde. (2026). Incidente de seguridad en una instalaci\u00f3n aeroespacial francesa que involucra a un trabajador temporal. Le Monde.fr. <\/li><li>France Info. (2026). Industria de defensa: verificaciones tras la introducci\u00f3n de un dispositivo conectado en una zona sensible. Radio France. <\/li><li>Agencia de la Uni\u00f3n Europea para la Ciberseguridad (ENISA). (2023). Tecnolog\u00eda emergente y riesgos de seguridad en dispositivos inteligentes port\u00e1tiles. Oficina de Publicaciones de ENISA. <\/li><li>Instituto Nacional de Est\u00e1ndares y Tecnolog\u00eda (NIST). (2022). Factores humanos en la gesti\u00f3n de riesgos de ciberseguridad. Publicaci\u00f3n especial del NIST. <\/li><li>Comisi\u00f3n Europea. (2020). Estrategia industrial de la UE y protecci\u00f3n de tecnolog\u00edas cr\u00edticas. Comisi\u00f3n Europea.<\/li><li>Directiva (UE) 2016\/943. (2016). Sobre la protecci\u00f3n del know-how y la informaci\u00f3n empresarial no divulgada (secretos comerciales).<\/li><li>Imagen ilustrativa generada mediante inteligencia artificial ChatGPT (2026).<\/li><\/ol>\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t<\/div>\n\n\t\n\t\t<div class=\"gem-textbox-bottom gem-textbox-bottom-none default-fill\">\n\t\t\t\t<\/div>\n\t\n\t\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>El reciente incidente que involucra el uso de gafas inteligentes por parte de un trabajador temporal en la industria aeroespacial francesa vuelve a plantear una inc\u00f3moda\u2026<\/p>\n","protected":false},"author":1,"featured_media":32162,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-fullwidth.php","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[122,124,404],"tags":[407,945,943,944,946,940,942,841,763,941],"class_list":{"0":"post-32179","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-articulos","8":"category-ciberseguridad","9":"category-noticias","10":"tag-aerospace","11":"tag-francia","12":"tag-gafas","13":"tag-incidente","14":"tag-industria","15":"tag-industrial","16":"tag-inteligente","17":"tag-que","18":"tag-riesgo","19":"tag-secreto"},"jetpack_featured_media_url":"https:\/\/mrknights.com\/wp-content\/uploads\/2026\/03\/Risk-of-Industrial-Secrecy-scaled.png","jetpack_sharing_enabled":true,"menu_order":0,"_links":{"self":[{"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/posts\/32179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/comments?post=32179"}],"version-history":[{"count":1,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/posts\/32179\/revisions"}],"predecessor-version":[{"id":32180,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/posts\/32179\/revisions\/32180"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/media\/32162"}],"wp:attachment":[{"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/media?parent=32179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/categories?post=32179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/tags?post=32179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}