{"id":64767,"date":"2025-10-29T14:24:11","date_gmt":"2025-10-29T13:24:11","guid":{"rendered":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3.jpg"},"modified":"2025-10-30T09:20:00","modified_gmt":"2025-10-30T08:20:00","slug":"congres-ciberseguretat-3-2","status":"inherit","type":"attachment","link":"https:\/\/www.conselharan.org\/es\/superamos-la-participacion-en-el-ii-congreso-de-ciberseguridad-armario-6-celebrado-en-aran\/congres-ciberseguretat-3-2\/","title":{"rendered":"Congr\u00e8s Ciberseguretat 3"},"author":2,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-scaled.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-300x200.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-300x200.jpg 300w, https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-1024x683.jpg 1024w, https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-768x512.jpg 768w, https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-1536x1024.jpg 1536w, https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-2048x1365.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n "},"caption":{"rendered":""},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":2560,"height":1707,"file":"2025\/10\/Congres-Ciberseguretat-3-scaled.jpg","filesize":701861,"sizes":{"medium":{"file":"Congres-Ciberseguretat-3-300x200.jpg","width":300,"height":200,"filesize":25580,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-300x200.jpg"},"large":{"file":"Congres-Ciberseguretat-3-1024x683.jpg","width":1024,"height":683,"filesize":109302,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-1024x683.jpg"},"thumbnail":{"file":"Congres-Ciberseguretat-3-150x150.jpg","width":150,"height":150,"filesize":19857,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-150x150.jpg"},"medium_large":{"file":"Congres-Ciberseguretat-3-768x512.jpg","width":768,"height":512,"filesize":70952,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-768x512.jpg"},"1536x1536":{"file":"Congres-Ciberseguretat-3-1536x1024.jpg","width":1536,"height":1024,"filesize":229632,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-1536x1024.jpg"},"2048x2048":{"file":"Congres-Ciberseguretat-3-2048x1365.jpg","width":2048,"height":1365,"filesize":417926,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-2048x1365.jpg"},"wt-slider-img":{"file":"Congres-Ciberseguretat-3-640x320.jpg","width":640,"height":320,"filesize":47119,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-640x320.jpg"},"wt-feat-large":{"file":"Congres-Ciberseguretat-3-423x330.jpg","width":423,"height":330,"filesize":37465,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-423x330.jpg"},"wt-cat-img":{"file":"Congres-Ciberseguretat-3-305x175.jpg","width":305,"height":175,"filesize":24930,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-305x175.jpg"},"wt-tile-large":{"file":"Congres-Ciberseguretat-3-270x270.jpg","width":270,"height":270,"filesize":28386,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-270x270.jpg"},"wt-feat-img":{"file":"Congres-Ciberseguretat-3-207x207.jpg","width":207,"height":207,"filesize":23580,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-207x207.jpg"},"wt-medium-thumb":{"file":"Congres-Ciberseguretat-3-75x75.jpg","width":75,"height":75,"filesize":16385,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-75x75.jpg"},"full":{"file":"Congres-Ciberseguretat-3-scaled.jpg","width":2560,"height":1707,"mime_type":"image\/jpeg","source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-scaled.jpg"}},"image_meta":{"aperture":"1.8","credit":"","camera":"Canon EOS 700D","caption":"","created_timestamp":"1761300084","copyright":"","focal_length":"50","iso":"5000","shutter_speed":"0.004","title":"","orientation":"1","keywords":[]},"original_image":"Congres-Ciberseguretat-3.jpg"},"post":64778,"source_url":"https:\/\/www.conselharan.org\/wp-content\/uploads\/2025\/10\/Congres-Ciberseguretat-3-scaled.jpg","_links":{"self":[{"href":"https:\/\/www.conselharan.org\/es\/wp-json\/wp\/v2\/media\/64767"}],"collection":[{"href":"https:\/\/www.conselharan.org\/es\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.conselharan.org\/es\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/www.conselharan.org\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.conselharan.org\/es\/wp-json\/wp\/v2\/comments?post=64767"}]}}