{"id":4593,"date":"2024-01-05T22:18:55","date_gmt":"2024-01-05T22:18:55","guid":{"rendered":"https:\/\/exfilsecurity.com\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/"},"modified":"2024-01-05T22:18:55","modified_gmt":"2024-01-05T22:18:55","slug":"how-we-built-out-a-fortune-100s-security-program-from-scratch","status":"publish","type":"post","link":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/","title":{"rendered":"How We Built Out a Fortune 100&#8217;s Security Program from Scratch"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4593\" class=\"elementor elementor-4593 elementor-4378\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a6d9e5 e-flex e-con-boxed sc_layouts_column_icons_position_left e-con e-parent\" data-id=\"3a6d9e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68aa5557 elementor-drop-cap-yes elementor-drop-cap-view-default sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"68aa5557\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;drop_cap&quot;:&quot;yes&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Architecting a security program for a Fortune 100 corporation involves a completely different set of considerations, skills, and maintenance tasks, than for any other context.<\/p><p>For starters, there\u2019s the trust element.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46622701 e-flex e-con-boxed sc_layouts_column_icons_position_left e-con e-parent\" data-id=\"46622701\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-424218e6 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"424218e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A corporation at that level requires next-level security, across hundreds of thousands of potential attack surfaces, and it\u2019s quite normal for them to pull in different agencies and organizations to bring their particular expertise to bear on any given surface. For instance, a physical security red team is going to bring completely different insights from a cloud-based web application security team. One size absolutely does not fit all, and so part of a major corporation\u2019s security strategy has got to be identifying the best of the best in regards to each security discipline.<\/p><p>A particular F100 company has multiple commercial off-the-shelf products in their environment, and was searching for a way to test the security built within these applications. A third-party vendor already interacting with the company listened to their concerns and the shape of the problem, and recommended that the F100 go with Exfil.<\/p><p>Exfil, with its extensive experience in testing applications to ensure they are safe to deploy in an enterprise environment, was a natural choice.<\/p><h2>Listen, Then Understand<\/h2><p>\u201cIt\u2019s important for us to understand the business, so be prepared to talk to us about the who-what-when-where-why of your business, so we make the right calls. From there, we need to understand the business units impacted by the service offerings,\u201d says Darren Davis, Exfil\u2019s Vice President of Sales and Marketing.<\/p><p>\u201cOnce that\u2019s done, it\u2019s important for our clients to understand we\u2019re not part of the prevention team. It\u2019s our job to understand what they do, and to put services in place that help them do their job more efficiently. We\u2019re asking questions about why apps were developed, what problem the app solves in the environment, if we\u2019re looking at payroll, why did you buy this product, what information within the product would you consider valuable (PHI, etc.), how would a breach affect the organization? What\u2019s the business purpose of the app? And so on\u2026\u201d<\/p><h2>Putting the Program in Place<\/h2><p>Taking over an already in-place program is generally easy \u2013 the same way improving an existing home is easier than building one from scratch. But in this case, the program did not already exist, and Exfil had to start by building the foundation.<\/p><h2>Stakeholder Buy-In<\/h2><p>Stakeholder buy-in is foundational to the success of any program. Without that buy-in, even the best program is likely to end up on the budgetary chopping block in some future quarter. With information security projects, it\u2019s even more critical, as the Black Box of security skills usually means unnecessary opacity in the sales process. So making the case to department heads on the need for continuous testing of the application deployed into the corporate environment could have been a challenge.<\/p><p>Enter Exfil\u2019s belief that the best way to accomplish this is to sit on the same side of the table as the user community. In doing so, they get a better understanding of the business needs of the applications being implemented. So this adventure truly began with multiple meetings with the teams, really listening as they described the landscape, and what they were hoping to get out of this program of testing.<\/p><h2>Continuous Testing<\/h2><p>Security is not a single-point-in-time event; not only is the internal environment changing, as users and applications come and go, but the external environment of vulnerabilities is in constant flux. So walking the line between wanting to call \u201cdone\u201d, and wanting to establish a culture of continuous security within the organization, involves a significant amount of communication.<\/p><p>And that\u2019s another place where Exfil shines. Early on, they set up meetings of varying formality over varying cadences, so that if at any point there was a question, there was a point in close proximity where it would be answered. Davis puts it this way<\/p><p>\u201cExfil\u2019s primary focus is the client and their needs. Based on our experience in multiple industries, we are able to provide a cross industry analysis of our clients\u2019 security maturity level. Understanding and being educated on the business of each department and how it flows into the company goals, allows for the development of a less punitive, more collaborative, security program.\u201d<\/p><p>So Exfil listened to their customer, and then they acted.<\/p><p>Respect for a Big Machine; Getting Work Done as a Small Machine<br \/>In the majority of basic infosec interactions, the security team takes the lead in educating, orchestrating, and executing the security plan that the in-house team will then take responsibility for executing against. But in a large organization with a lot of formalized processes that have to be taken into account, coordination is the biggest obstacle. Davis says,<\/p><p>\u201cIt\u2019s extremely important that everyone understands their individual roles in creating a successful project. We are support, and we work for the business owners.\u201d<\/p><p>Security is a piece of the puzzle; not the puzzle itself. What\u2019s the key piece? \u201cHands down, it\u2019s about the people at Exfil. We\u2019re very particular in the types of people that we hire, and we have an extensive coaching and development program that helps them understand company goals for clear execution of a project. The Exfil team is committed to the idea that not about us, it\u2019s about them. We are \u201chelp first\u201d oriented, and not all about some security ego \u201cgotcha\u201d.<\/p><h2>Success on Both Sides<\/h2><p>How do you measure success as a boutique security firm working with a giant?<\/p><p>Stakeholder approval. \u201cAs it relates to the engagement, as it relates to the communication around the engagement, as it relates to delivery, accuracy of reports, follow-through. All things we have massive credits for,\u201d says Davis. When problems are being solved consistently, when the security footing is strong and stable, when communication flows easily from the client to the security team and back again, then we know that we\u2019re doing the right thing and doing it well.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Architecting a security program for a Fortune 100 corporation involves a completely different&hellip;<\/p>\n","protected":false},"author":18,"featured_media":4594,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-4593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-strategy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How We Built Out a Fortune 100&#039;s Security Program from Scratch - Exfil Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How We Built Out a Fortune 100&#039;s Security Program from Scratch - Exfil Security\" \/>\n<meta property=\"og:description\" content=\"Architecting a security program for a Fortune 100 corporation involves a completely different&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/\" \/>\n<meta property=\"og:site_name\" content=\"Exfil Security\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-05T22:18:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/fndherobanner3F.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Felipe Mu\u00f1oz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Felipe Mu\u00f1oz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/\"},\"author\":{\"name\":\"Felipe Mu\u00f1oz\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/cdb8f7466522259992831061c2a6a2e7\"},\"headline\":\"How We Built Out a Fortune 100&#8217;s Security Program from Scratch\",\"datePublished\":\"2024-01-05T22:18:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/\"},\"wordCount\":1025,\"publisher\":{\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/01\/wp-f100-sm-header.png\",\"articleSection\":[\"Cyber Strategy\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/\",\"url\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/\",\"name\":\"How We Built Out a Fortune 100's Security Program from Scratch - Exfil Security\",\"isPartOf\":{\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/01\/wp-f100-sm-header.png\",\"datePublished\":\"2024-01-05T22:18:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#primaryimage\",\"url\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/01\/wp-f100-sm-header.png\",\"contentUrl\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/01\/wp-f100-sm-header.png\",\"width\":750,\"height\":493},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/exfilsecurity.com\/es\/inicio\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How We Built Out a Fortune 100&#8217;s Security Program from Scratch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#website\",\"url\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/\",\"name\":\"Exfil Security\",\"description\":\"Where expertise meets trust.\",\"publisher\":{\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization\",\"name\":\"Exfil Security\",\"url\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/cropped-Exfil-Nuevo-Logo-02.png\",\"contentUrl\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/cropped-Exfil-Nuevo-Logo-02.png\",\"width\":1401,\"height\":474,\"caption\":\"Exfil Security\"},\"image\":{\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/cdb8f7466522259992831061c2a6a2e7\",\"name\":\"Felipe Mu\u00f1oz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2471dbc0af0217668270d4682774de0d92c3a6460bdf353049c3a0d5e964a4d7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2471dbc0af0217668270d4682774de0d92c3a6460bdf353049c3a0d5e964a4d7?s=96&d=mm&r=g\",\"caption\":\"Felipe Mu\u00f1oz\"},\"url\":\"https:\/\/exfilsecurity.com\/es\/author\/felipej\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How We Built Out a Fortune 100's Security Program from Scratch - Exfil Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/","og_locale":"es_ES","og_type":"article","og_title":"How We Built Out a Fortune 100's Security Program from Scratch - Exfil Security","og_description":"Architecting a security program for a Fortune 100 corporation involves a completely different&hellip;","og_url":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/","og_site_name":"Exfil Security","article_published_time":"2024-01-05T22:18:55+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/fndherobanner3F.jpg","type":"image\/jpeg"}],"author":"Felipe Mu\u00f1oz","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Felipe Mu\u00f1oz","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#article","isPartOf":{"@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/"},"author":{"name":"Felipe Mu\u00f1oz","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/cdb8f7466522259992831061c2a6a2e7"},"headline":"How We Built Out a Fortune 100&#8217;s Security Program from Scratch","datePublished":"2024-01-05T22:18:55+00:00","mainEntityOfPage":{"@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/"},"wordCount":1025,"publisher":{"@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization"},"image":{"@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#primaryimage"},"thumbnailUrl":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/01\/wp-f100-sm-header.png","articleSection":["Cyber Strategy"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/","url":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/","name":"How We Built Out a Fortune 100's Security Program from Scratch - Exfil Security","isPartOf":{"@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#primaryimage"},"image":{"@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#primaryimage"},"thumbnailUrl":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/01\/wp-f100-sm-header.png","datePublished":"2024-01-05T22:18:55+00:00","breadcrumb":{"@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#primaryimage","url":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/01\/wp-f100-sm-header.png","contentUrl":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/01\/wp-f100-sm-header.png","width":750,"height":493},{"@type":"BreadcrumbList","@id":"https:\/\/exfilsecurity.com\/es\/how-we-built-out-a-fortune-100s-security-program-from-scratch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exfilsecurity.com\/es\/inicio\/"},{"@type":"ListItem","position":2,"name":"How We Built Out a Fortune 100&#8217;s Security Program from Scratch"}]},{"@type":"WebSite","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#website","url":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/","name":"Exfil Security","description":"Where expertise meets trust.","publisher":{"@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization","name":"Exfil Security","url":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/logo\/image\/","url":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/cropped-Exfil-Nuevo-Logo-02.png","contentUrl":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/cropped-Exfil-Nuevo-Logo-02.png","width":1401,"height":474,"caption":"Exfil Security"},"image":{"@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/cdb8f7466522259992831061c2a6a2e7","name":"Felipe Mu\u00f1oz","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2471dbc0af0217668270d4682774de0d92c3a6460bdf353049c3a0d5e964a4d7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2471dbc0af0217668270d4682774de0d92c3a6460bdf353049c3a0d5e964a4d7?s=96&d=mm&r=g","caption":"Felipe Mu\u00f1oz"},"url":"https:\/\/exfilsecurity.com\/es\/author\/felipej\/"}]}},"_links":{"self":[{"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/posts\/4593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/comments?post=4593"}],"version-history":[{"count":0,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/posts\/4593\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/media\/4594"}],"wp:attachment":[{"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/media?parent=4593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/categories?post=4593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/tags?post=4593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}