{"id":1906,"date":"2024-11-11T11:56:41","date_gmt":"2024-11-11T11:56:41","guid":{"rendered":"https:\/\/elink.cat\/blog\/?p=1906"},"modified":"2025-06-18T14:08:02","modified_gmt":"2025-06-18T14:08:02","slug":"ciberseguretat-basada-en-ia","status":"publish","type":"post","link":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/","title":{"rendered":"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a?"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lectura: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minuts<\/span><\/span><p>Amb el creixement accelerat de la tecnologia, la intel\u00b7lig\u00e8ncia artificial (IA) est\u00e0 canviant radicalment el panorama de la ciberseguretat. Per a moltes empreses, implementar solucions de ciberseguretat basades en IA significa refor\u00e7ar la seva protecci\u00f3 davant de les amenaces cada cop m\u00e9s sofisticades. La IA permet una <strong>detecci\u00f3 d\u2019amenaces proactiva<\/strong> i m\u00e9s r\u00e0pida, cosa que proporciona a les empreses una capa de seguretat addicional que simplement no es pot aconseguir amb m\u00e8todes tradicionals.\u00a0 Tot i aix\u00ed, \u00e9s un tema complex i amb alguns punts d\u2019alerta. En aquest article, explorem com la IA pot ser un aliat essencial per a empreses que volen augmentar la seva seguretat, tot i que tamb\u00e9 s\u2019han d\u2019abordar certs riscos. Amb una implementaci\u00f3 adequada, els beneficis de la IA per a la ciberseguretat s\u00f3n molt interessants.<\/p>\n<h3>Com la IA ajuda en la detecci\u00f3 proactiva d\u2019amenaces<\/h3>\n<p>Un dels avantatges m\u00e9s importants d\u2019utilitzar IA en ciberseguretat \u00e9s la seva capacitat per detectar amenaces abans que es converteixin en problemes reals. Com ja sabem, les solucions d\u2019IA poden analitzar grans volums de dades i identificar patrons o anomalies que podrien indicar la pres\u00e8ncia d\u2019una amena\u00e7a. Per exemple, si un usuari comen\u00e7a a mostrar comportaments inusuals, com accedir a fitxers confidencials de manera repetida o intentar entrar en sistemes restringits, la IA pot detectar aquests patrons i alertar l\u2019equip de seguretat abans que l\u2019amena\u00e7a es materialitzi.\u00a0Aquest enfoc proactiu permet que les empreses s\u2019avancin als atacants, i aix\u00f2 \u00e9s especialment important en un moment en qu\u00e8 les amenaces cibern\u00e8tiques s\u00f3n m\u00e9s complexes i freq\u00fcents que mai. Les eines tradicionals sovint reaccionen nom\u00e9s quan el dany ja est\u00e0 fet, mentre que la IA pot identificar problemes en temps real, ajudant a mitigar-los immediatament i contrarestar-los de forma m\u00e9s eficient.<\/p>\n<h3>Adaptaci\u00f3 constant a noves amenaces<\/h3>\n<p>Tots sabem que els ciberatacs evolucionen constantment, i el que funciona avui pot no ser efectiu dem\u00e0. La IA, per\u00f2, pot aprendre i adaptar-se amb cada nova amena\u00e7a que identifica, evolucionant i modificant el seu comportament. Els sistemes basats en aprenentatge autom\u00e0tic analitzen els incidents de seguretat passats per ajustar els seus algorismes i millorar les seves respostes futures. Aix\u00f2 \u00e9s especialment \u00fatil per a empreses que operen en entorns canviants o altament regulats, com la banca o el sector de la salut, on els errors poden ser molt costosos. Aquesta capacitat d\u2019aprenentatge continu significa que la IA pot mantenir la ciberseguretat d\u2019una empresa actualitzada i preparada per a les amenaces emergents, amb una capacitat de resposta i adaptaci\u00f3 que seria impossible aconseguir manualment.<\/p>\n<h3>Reducci\u00f3 de la c\u00e0rrega de treball per als equips de seguretat<\/h3>\n<p>Amb la gran quantitat de dades\u00a0 i amenaces que circulen avui dia, els equips de ciberseguretat solen estar saturats de tasques i alertes. Aix\u00f2 pot fer que, en molts casos, les amenaces passin desapercebudes, simplement perqu\u00e8 els humans no podem processar tanta informaci\u00f3 alhora. La IA pot fer una gran difer\u00e8ncia en aquest aspecte, ja que pot filtrar i prioritzar les amenaces, fent un cribatge i deixant que els experts humans se centrin en els problemes m\u00e9s complexos i cr\u00edtics. Per exemple, si hi ha milers d\u2019intents d\u2019acc\u00e9s sospit\u00f3s en una xarxa, la IA pot identificar els m\u00e9s perillosos o els que tenen m\u00e9s probabilitats de ser efectius, reduint aix\u00ed la c\u00e0rrega de treball de l\u2019equip i millorant l\u2019efici\u00e8ncia general de la seguretat de l\u2019empresa. Aix\u00f2 no nom\u00e9s facilita el treball diari dels equips de seguretat, sin\u00f3 que tamb\u00e9 garanteix una resposta m\u00e9s r\u00e0pida i eficient en moments cr\u00edtics.<\/p>\n<h3>Una estrat\u00e8gia de seguretat m\u00e9s intel\u00b7ligent i integrada<\/h3>\n<p>Per a moltes empreses, especialment les que treballen amb dades sensibles, la IA representa una oportunitat per desenvolupar una estrat\u00e8gia de ciberseguretat m\u00e9s robusta i completa. Les solucions d\u2019IA es poden integrar en sistemes existents de seguretat, com les eines de monitoratge de xarxa, els sistemes de prevenci\u00f3 d\u2019intrusions o les plataformes de gesti\u00f3 de vulnerabilitats. Aquesta integraci\u00f3 permet que la IA actu\u00ef com una capa addicional de protecci\u00f3, combinant les capacitats dels sistemes de seguretat tradicionals amb la pot\u00e8ncia anal\u00edtica de la IA. Una estrat\u00e8gia de seguretat amb IA no es limita a respondre a les amenaces actuals, sin\u00f3 que tamb\u00e9 anticipa futures vulnerabilitats i ajusta les defenses d\u2019acord amb les noves amenaces que van sorgint. Aix\u00f2 ofereix a les empreses una visi\u00f3 m\u00e9s \u00e0mplia i profunda de la seva seguretat, i la capacitat de respondre proactivament en un entorn cada vegada m\u00e9s complex.<\/p>\n<h3>Conclusi\u00f3: la IA \u00e9s un aliat imprescindible en ciberseguretat<\/h3>\n<p>En un context on els ciberatacs s\u00f3n cada cop m\u00e9s sofisticats, l\u2019\u00fas de la IA en ciberseguretat esdev\u00e9 una necessitat per a empreses que volen protegir-se millor i reaccionar amb rapidesa davant de noves amenaces. Tot i que la IA presenta alguns riscos i la possibilitat que tamb\u00e9 pugui ser utilitzada per atacants, els avantatges que ofereix superen aquests riscos si es gestionen correctament. La ciberseguretat basada en IA \u00e9s una inversi\u00f3 que pot ajudar les empreses a detectar amenaces abans que es converteixin en un problema greu, mantenir-se actualitzades davant noves vulnerabilitats, reduir la c\u00e0rrega de treball dels equips humans i crear una estrat\u00e8gia de seguretat m\u00e9s s\u00f2lida i intel\u00b7ligent. Per a qualsevol empresa que tingui la seguretat com a prioritat, la IA ja no \u00e9s nom\u00e9s una opci\u00f3; <strong>\u00e9s una eina clau que aporta seguretat, efic\u00e0cia i tranquil\u00b7litat.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lectura: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minuts<\/span><\/span>Amb el creixement accelerat de la tecnologia, la intel\u00b7lig\u00e8ncia artificial (IA) est\u00e0 canviant radicalment el panorama de la ciberseguretat. Per a moltes empreses, implementar solucions de ciberseguretat basades en IA<\/p>\n","protected":false},"author":1,"featured_media":1907,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","breadcrumbs_single_post":"","page_title_panel":"","breadcrumbs_single_page":"","single_page_alignment":"","single_page_margin":"","page_structure_type":"","content_style_source":"","content_style":"","blog_post_streched_ed":"","blog_page_streched_ed":"","has_transparent_header":"","disable_transparent_header":"","vertical_spacing_source":"","content_area_spacing":"","single_post_content_background":"","single_page_content_background":"","single_post_boxed_content_spacing":"","single_page_boxed_content_spacing":"","single_post_content_boxed_radius":"","single_page_content_boxed_radius":"","disable_featured_image":"","disable_post_tags":"","disable_author_box":"","disable_posts_navigation":"","disable_comments":"","disable_related_posts":"","disable_header":"","disable_footer":"","footnotes":""},"categories":[28],"tags":[],"class_list":["post-1906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risc-i-etica","rishi-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a? - Blog Elinkcat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a? - Blog Elinkcat\" \/>\n<meta property=\"og:description\" content=\"Temps de lectura:  3 minutsAmb el creixement accelerat de la tecnologia, la intel\u00b7lig\u00e8ncia artificial (IA) est\u00e0 canviant radicalment el panorama de la ciberseguretat. Per a moltes empreses, implementar solucions de ciberseguretat basades en IA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Elinkcat\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-11T11:56:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T14:08:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"\u00d2scar Junyent\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u00d2scar Junyent\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/\"},\"author\":{\"name\":\"\u00d2scar Junyent\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#\\\/schema\\\/person\\\/13577ee4b0279d498b46e86c8798afe2\"},\"headline\":\"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a?\",\"datePublished\":\"2024-11-11T11:56:41+00:00\",\"dateModified\":\"2025-06-18T14:08:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/\"},\"wordCount\":966,\"publisher\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cybersecurity.webp\",\"articleSection\":[\"Riscos, \u00e8tica i ciberseguretat\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/\",\"name\":\"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a? - Blog Elinkcat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cybersecurity.webp\",\"datePublished\":\"2024-11-11T11:56:41+00:00\",\"dateModified\":\"2025-06-18T14:08:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cybersecurity.webp\",\"contentUrl\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cybersecurity.webp\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/ciberseguretat-basada-en-ia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/elink.cat\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/\",\"name\":\"Blog Elinkcat\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/elink.cat\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#organization\",\"name\":\"Blog Elinkcat\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cropped-elinkcat-default-light-bg.png\",\"contentUrl\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cropped-elinkcat-default-light-bg.png\",\"width\":1278,\"height\":127,\"caption\":\"Blog Elinkcat\"},\"image\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#\\\/schema\\\/person\\\/13577ee4b0279d498b46e86c8798afe2\",\"name\":\"\u00d2scar Junyent\",\"sameAs\":[\"https:\\\/\\\/elink.cat\\\/blog\"],\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/author\\\/ojunyentelink-cat\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a? - Blog Elinkcat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/","og_locale":"ca_ES","og_type":"article","og_title":"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a? - Blog Elinkcat","og_description":"Temps de lectura:  3 minutsAmb el creixement accelerat de la tecnologia, la intel\u00b7lig\u00e8ncia artificial (IA) est\u00e0 canviant radicalment el panorama de la ciberseguretat. Per a moltes empreses, implementar solucions de ciberseguretat basades en IA","og_url":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/","og_site_name":"Blog Elinkcat","article_published_time":"2024-11-11T11:56:41+00:00","article_modified_time":"2025-06-18T14:08:02+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity.webp","type":"image\/webp"}],"author":"\u00d2scar Junyent","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u00d2scar Junyent","Est. reading time":"5 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/#article","isPartOf":{"@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/"},"author":{"name":"\u00d2scar Junyent","@id":"https:\/\/elink.cat\/blog\/#\/schema\/person\/13577ee4b0279d498b46e86c8798afe2"},"headline":"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a?","datePublished":"2024-11-11T11:56:41+00:00","dateModified":"2025-06-18T14:08:02+00:00","mainEntityOfPage":{"@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/"},"wordCount":966,"publisher":{"@id":"https:\/\/elink.cat\/blog\/#organization"},"image":{"@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity.webp","articleSection":["Riscos, \u00e8tica i ciberseguretat"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/","url":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/","name":"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a? - Blog Elinkcat","isPartOf":{"@id":"https:\/\/elink.cat\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/#primaryimage"},"image":{"@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity.webp","datePublished":"2024-11-11T11:56:41+00:00","dateModified":"2025-06-18T14:08:02+00:00","breadcrumb":{"@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/#primaryimage","url":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity.webp","contentUrl":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity.webp","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/elink.cat\/blog\/ciberseguretat-basada-en-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/elink.cat\/blog\/"},{"@type":"ListItem","position":2,"name":"Ciberseguretat basada en ia: protecci\u00f3 proactiva o nova amena\u00e7a?"}]},{"@type":"WebSite","@id":"https:\/\/elink.cat\/blog\/#website","url":"https:\/\/elink.cat\/blog\/","name":"Blog Elinkcat","description":"","publisher":{"@id":"https:\/\/elink.cat\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/elink.cat\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/elink.cat\/blog\/#organization","name":"Blog Elinkcat","url":"https:\/\/elink.cat\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/elink.cat\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/01\/cropped-elinkcat-default-light-bg.png","contentUrl":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/01\/cropped-elinkcat-default-light-bg.png","width":1278,"height":127,"caption":"Blog Elinkcat"},"image":{"@id":"https:\/\/elink.cat\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/elink.cat\/blog\/#\/schema\/person\/13577ee4b0279d498b46e86c8798afe2","name":"\u00d2scar Junyent","sameAs":["https:\/\/elink.cat\/blog"],"url":"https:\/\/elink.cat\/blog\/author\/ojunyentelink-cat\/"}]}},"_links":{"self":[{"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/posts\/1906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/comments?post=1906"}],"version-history":[{"count":6,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/posts\/1906\/revisions"}],"predecessor-version":[{"id":1913,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/posts\/1906\/revisions\/1913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/media\/1907"}],"wp:attachment":[{"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/media?parent=1906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/categories?post=1906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/tags?post=1906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}