[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/extrimian.io\/es\/wikis\/cybersecurity-technologies\/#Article","mainEntityOfPage":"https:\/\/extrimian.io\/es\/wikis\/cybersecurity-technologies\/","headline":"Cybersecurity Technologies","name":"Cybersecurity Technologies","description":"Welcome to the Extrimian Cybersecurity Wiki. This resource offers an in-depth look at the cutting-edge cybersecurity technologies that protect digital assets and information systems. We explore how Self-Sovereign Identity (SSI) and other advanced tools integrate with Extrimian products to guard against cyber threats. What Is Cybersecurity? Cybersecurity involves defending systems, networks, and programs from digital [&hellip;]","datePublished":"2024-07-04","dateModified":"2024-07-15","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/es\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/es\/author\/julieta-cura\/","identifier":2,"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1776258780","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1776258780","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/07\/Cybersecurity-Wiki.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/07\/Cybersecurity-Wiki.png","height":1500,"width":3000},"url":"https:\/\/extrimian.io\/es\/wikis\/cybersecurity-technologies\/"},{"@context":"https:\/\/schema.org","@type":"BreadcrumbList","@id":"https:\/\/extrimian.io\/es\/wikis\/cybersecurity-technologies\/#BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Wikis","item":"https:\/\/extrimian.io\/es\/wikis\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"Cybersecurity Technologies","item":"https:\/\/extrimian.io\/es\/wikis\/cybersecurity-technologies\/#breadcrumbitem"}]}]