{"id":4967,"date":"2026-03-03T09:44:42","date_gmt":"2026-03-03T08:44:42","guid":{"rendered":"https:\/\/enthec.com\/extended-cybersecurity\/"},"modified":"2026-03-04T10:11:35","modified_gmt":"2026-03-04T09:11:35","slug":"extended-cybersecurity","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/extended-cybersecurity\/","title":{"rendered":"Extended Cybersecurity"},"content":{"rendered":"<h4>Extended Cybersecurity<\/h4>\n<p>The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These relate to the scope of the strategy, the lack of involvement of the rest of the organisation and the insufficient corporate resources allocated to cyber security. In this paper we analyse these challenges and propose how to solve them using the corporate cyber security strategy itself based on innovative cyber security solutions.<\/p>\n<p><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/WP-CISO-Extended-Cybersecurity.pdf\"><i class=\"fa fa-download\"><\/i> Download Extended Cybersecurity Document<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Extended Cybersecurity The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":4894,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[96],"tags":[],"class_list":["post-4967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-descargables-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Extended Cybersecurity - ENTHEC \u00b7 Kartos \u00b7 Qondar<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/extended-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extended Cybersecurity - ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"og:description\" content=\"Extended Cybersecurity The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/extended-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-03T08:44:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T09:11:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1350\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patricia Hernandez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patricia Hernandez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/\"},\"author\":{\"name\":\"Patricia Hernandez\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/ca39e450d4d09a7a39995a9b0a27bfe2\"},\"headline\":\"Extended Cybersecurity\",\"datePublished\":\"2026-03-03T08:44:42+00:00\",\"dateModified\":\"2026-03-04T09:11:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/\"},\"wordCount\":79,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png\",\"articleSection\":[\"Descargables\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/extended-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/\",\"url\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/\",\"name\":\"Extended Cybersecurity - ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png\",\"datePublished\":\"2026-03-03T08:44:42+00:00\",\"dateModified\":\"2026-03-04T09:11:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/extended-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png\",\"width\":1350,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/extended-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Extended Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/ca39e450d4d09a7a39995a9b0a27bfe2\",\"name\":\"Patricia Hernandez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g\",\"caption\":\"Patricia Hernandez\"},\"url\":\"https:\/\/enthec.com\/en\/author\/phernandez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Extended Cybersecurity - ENTHEC \u00b7 Kartos \u00b7 Qondar","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/extended-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Extended Cybersecurity - ENTHEC \u00b7 Kartos \u00b7 Qondar","og_description":"Extended Cybersecurity The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These [&hellip;]","og_url":"https:\/\/enthec.com\/en\/extended-cybersecurity\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2026-03-03T08:44:42+00:00","article_modified_time":"2026-03-04T09:11:35+00:00","og_image":[{"width":1350,"height":1350,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png","type":"image\/png"}],"author":"Patricia Hernandez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patricia Hernandez","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/"},"author":{"name":"Patricia Hernandez","@id":"https:\/\/enthec.com\/#\/schema\/person\/ca39e450d4d09a7a39995a9b0a27bfe2"},"headline":"Extended Cybersecurity","datePublished":"2026-03-03T08:44:42+00:00","dateModified":"2026-03-04T09:11:35+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/"},"wordCount":79,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png","articleSection":["Descargables"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/extended-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/","url":"https:\/\/enthec.com\/en\/extended-cybersecurity\/","name":"Extended Cybersecurity - ENTHEC \u00b7 Kartos \u00b7 Qondar","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png","datePublished":"2026-03-03T08:44:42+00:00","dateModified":"2026-03-04T09:11:35+00:00","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/extended-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-7.png","width":1350,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/extended-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Extended Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/ca39e450d4d09a7a39995a9b0a27bfe2","name":"Patricia Hernandez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g","caption":"Patricia Hernandez"},"url":"https:\/\/enthec.com\/en\/author\/phernandez\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=4967"}],"version-history":[{"count":3,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4967\/revisions"}],"predecessor-version":[{"id":4991,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4967\/revisions\/4991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/4894"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=4967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=4967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=4967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}