<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://www.cyte.co/en/blog/nl_70_la-serpiente-que-se-comi%C3%B3-dos-elefantes</loc>
<lastmod>2023-01-18</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_69_windows%2C-word-y-genshin-impact%2C-un-mismo-ataque%3A-escalamiento-de-privilegios</loc>
<lastmod>2023-01-12</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_68_caso-de-estudio%3A-log4shell%2C-la-vulnerabilidad-m%C3%A1s-grave-del-2021</loc>
<lastmod>2022-11-21</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_67_qu%C3%A9-es-el-modelo-de-confianza-cero-y-c%C3%B3mo-puede-ayudarnos-a-mejorar-la-postura-en-seguridad</loc>
<lastmod>2022-11-04</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_66_%C2%BFcomo-hackean-a-una-persona-del-com%C3%BAn%2C-o-tu-pareja-a-ti%3F</loc>
<lastmod>2022-10-25</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_65_owasp-top-10-2021-%3A-%C2%BFqu%C3%A9-es-y-c%C3%B3mo-se-come%3F</loc>
<lastmod>2022-10-05</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_64_vulnerabilidades-en-algoritmos-de-criptograf%C3%ADa-post-cu%C3%A1ntica</loc>
<lastmod>2022-09-20</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_63_la-computaci%C3%B3n-anal%C3%B3gica.-volver-al-pasado</loc>
<lastmod>2022-09-13</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_62_el-impacto-de-la-computaci%C3%B3n-cu%C3%A1ntica</loc>
<lastmod>2022-09-13</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_61_nfts%3A-especulaci%C3%B3n%2C-da%C3%B1o-ambiental%2C-estafas-y-fraudes</loc>
<lastmod>2022-08-19</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_60_una-mirada-r%C3%A1pida-al-threat-hunting</loc>
<lastmod>2022-08-16</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_59_antivirus%3A-una-herramienta-amiga-de-la-ciberseguridad</loc>
<lastmod>2022-08-03</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_58_anecdotas-de-ciberataques</loc>
<lastmod>2022-07-28</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_57_el-crypto-invierno-est%C3%A1-aqu%C3%AD</loc>
<lastmod>2022-07-13</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_56_rsa-y-el-algoritmo-de-shor</loc>
<lastmod>2022-07-05</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_55_internet-de-las-cosas-y-ciberseguridad</loc>
<lastmod>2022-07-05</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_54_hashes_perceptuales</loc>
<lastmod>2022-06-21</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_53_vulnerabilidades_de_dia_cero</loc>
<lastmod>2022-06-16</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_52_%C2%A1cuidado-con-tus-dependencias!</loc>
<lastmod>2022-06-09</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_51-la-computaci%C3%B3n-cu%C3%A1ntica-y-disrupci%C3%B3n-de-industrias</loc>
<lastmod>2022-06-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_50-el-auge-de-la-cultura-cripto</loc>
<lastmod>2022-05-25</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_49-complejidad-de-problemas-de-criptograf%C3%ADa-cl%C3%A1sica-y-post-cu%C3%A1ntica</loc>
<lastmod>2022-05-17</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_48_un-nuevo-est%C3%A1ndar-criptogr%C3%A1fico%3A-hpke</loc>
<lastmod>2022-05-16</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_47_humanismo-tecnol%C3%B3gico.-el-reto-de-la-era-de-la-digitalizaci%C3%B3n</loc>
<lastmod>2022-05-17</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_46_kali-linux%2C-una-de-las-herramientas-m%C3%A1s-poderosas-de-la-seguridad-de-la-informaci%C3%B3n</loc>
<lastmod>2022-05-17</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_45_retos-en-la-regulaci%C3%B3n-en-seguridad-de-la-informaci%C3%B3n-y-su-implementaci%C3%B3n</loc>
<lastmod>2022-03-30</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_44_teoria-de-la-informacion-y-wordle</loc>
<lastmod>2022-05-17</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_43_las-deepfake.-montajes-con-inteligencia-artificial</loc>
<lastmod>2022-05-17</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_42_el_ciber-frente_de_la_invasi%C3%B3n_a_ucrania</loc>
<lastmod>2022-03-08</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_41_consecuencias_ataques_ciberneticos</loc>
<lastmod>2022-03-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_40_proteccion_de_servicios_digitales_de_banca_corporativa</loc>
<lastmod>2022-03-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_40_protecci%C3%B3n-de-servicios-digitales-de-banca-corporativa</loc>
<lastmod>2022-03-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_39_la_revoluci%C3%B3n_financiera_crypto</loc>
<lastmod>2022-02-15</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_38_predicciones_2022</loc>
<lastmod>2022-02-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_37_modelos-epidemiol%C3%B3gicos-en-seguridad-para-dispositivos-iot</loc>
<lastmod>2022-02-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_36_pegasus_malware</loc>
<lastmod>2021-09-22</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_35_la_ley_de_moore_ha_muerto</loc>
<lastmod>2021-06-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_33-homomorphic-encryption</loc>
<lastmod>2021-04-06</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_32-criptograf%C3%ADa-post-cu%C3%A1ntica</loc>
<lastmod>2022-02-21</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_31-firmas-digitales%3A-%C2%BFqu%C3%A9-son-y-c%C3%B3mo-usarlas%3F</loc>
<lastmod>2021-02-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_30-solarwinds%C2%AE-hack</loc>
<lastmod>2021-01-27</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_22-ingenier%C3%ADa-criptogr%C3%A1fica</loc>
<lastmod>2020-09-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_21-acerca-de-autenticaci%C3%B3n</loc>
<lastmod>2020-08-24</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_20-pan%2C-criptograf%C3%ADa-y-tokenizaci%C3%B3n</loc>
<lastmod>2020-08-24</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_19-sobreviviendo-a-las-llamadas-indeseadas</loc>
<lastmod>2020-08-24</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_17-acerca-de-biometr%C3%ADa</loc>
<lastmod>2020-08-24</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_15-apt%3A-la-peor-amenaza-inform%C3%A1tica</loc>
<lastmod>2020-07-15</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_14-ingenier%C3%ADa-social-y-comportamiento-humano...-%C2%BFpor-qu%C3%A9-somos-vulnerables%3F-</loc>
<lastmod>2020-07-15</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_13-identidad-virtual-en-colombia</loc>
<lastmod>2020-07-01</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_12-%C2%BFqu%C3%A9-hay-en-un-nueve%3F</loc>
<lastmod>2020-06-24</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_11-tips-para-no-ser-hackeado-</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_10-ia-como-herramienta-en-infosec</loc>
<lastmod>2020-07-15</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_9-riesgos-infosec-en-tesorer%C3%ADa</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_3-incertidumbre-y-gesti%C3%B3n-de-riesgos</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_6-seguridad-en-sistemas-pgp</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_5-desciframiento-forzado</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_4-la-seguridad-y-los-controles-como-%E2%80%98teatro%E2%80%99</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_8-inteligencia-arti%EF%AC%81cial-y-forense-digital</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_7-lo-da%C3%B1ino-de-las-normas-de-gesti%C3%B3n-iso</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_2-ciberseguridad-y-riesgo-operacional</loc>
<lastmod>2020-06-11</lastmod>
</url>
<url>
<loc>https://www.cyte.co/en/blog/nl_1-escalabilidad-en-la-blockchain</loc>
<lastmod>2020-06-17</lastmod>
</url>
</urlset>