{"id":1952,"date":"2025-12-20T21:48:38","date_gmt":"2025-12-20T21:48:38","guid":{"rendered":"https:\/\/www.bigfive.net\/?page_id=1952"},"modified":"2025-12-20T22:44:37","modified_gmt":"2025-12-20T22:44:37","slug":"csirt","status":"publish","type":"page","link":"https:\/\/www.bigfive.net\/es\/csirt\/","title":{"rendered":"CSIRT"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1952\" class=\"elementor elementor-1952\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-808ea94 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"808ea94\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c6a8873 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c6a8873\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Big Five of the CSIRT <span class=\"fuerza\"> Cybersecurity Incident Response Team <\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-981d1e6 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"981d1e6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b7bb811 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no elementor-invisible e-con e-child\" data-id=\"b7bb811\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c70f4e elementor-widget elementor-widget-text-editor\" data-id=\"5c70f4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Bigfive, we have a dedicated cybersecurity incident management and response team (CSIRT), available 24\/7. The CSIRT works in coordination with our Security Operations Center (SOC) to ensure comprehensive protection, responding quickly and accurately to any threat and continuously strengthening the resilience of our clients&#8217; critical technology environments and our own infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a193a49 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no elementor-invisible e-con e-child\" data-id=\"a193a49\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1be687 elementor-widget elementor-widget-text-editor\" data-id=\"c1be687\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bigfive&#8217;s CSIRT is governed by internationally recognized best practices and guidelines, inspired by frameworks such as <strong>NIST SP 800-61r2, ISO\/IEC 27035, ISO\/IEC 27001, and FIRST.<\/strong> This operating model enables a structured, agile, and constantly evolving response to cybersecurity incidents, protecting critical technological environments of the organization and its customers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f055212 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"f055212\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49d64af elementor-invisible elementor-widget elementor-widget-image\" data-id=\"49d64af\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"933\" src=\"https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-scaled.webp\" class=\"attachment-full size-full wp-image-1839\" alt=\"\" srcset=\"https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-scaled.webp 2560w, https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-300x109.webp 300w, https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-1024x373.webp 1024w, https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-768x280.webp 768w, https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-1536x560.webp 1536w, https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-2048x746.webp 2048w, https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-18x7.webp 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-beaefe4 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"beaefe4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-616bc40 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"616bc40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-103f199 elementor-widget elementor-widget-image\" data-id=\"103f199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/07\/Documento.webp\" class=\"attachment-large size-large wp-image-1708\" alt=\"\" srcset=\"https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/07\/Documento.webp 750w, https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/07\/Documento-300x200.webp 300w, https:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/07\/Documento-18x12.webp 18w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-843fd7e e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"843fd7e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-303b554 elementor-widget elementor-widget-text-editor\" data-id=\"303b554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>RFC \u2013 Request for Comments<\/strong><br \/>At Bigfive, <strong>our RFC is a key document for managing cybersecurity incidents and cases,<\/strong> aligned with the standards required by FIRST and international best practices. This formal mechanism allows us to record, evaluate, and follow up on critical situations, ensuring traceability, transparency, and continuous improvement in our response processes.<br \/>Download it and learn how we strengthen the digital security of our organization and that of our clients.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83dbaf elementor-widget elementor-widget-button\" data-id=\"c83dbaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/Formato-RFC-2350-Bigfive-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download RFC document<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The Big Five of the CSIRT Cybersecurity Incident Response Team At Bigfive, we have a dedicated cybersecurity incident management and response team (CSIRT), available 24\/7. The CSIRT works in coordination with our Security Operations Center (SOC) to ensure comprehensive protection, responding quickly and accurately to any threat and continuously strengthening the resilience of our clients&#8217; critical technology environments and our own infrastructure. Bigfive&#8217;s CSIRT is governed by internationally recognized best practices and guidelines, inspired by frameworks such as NIST SP 800-61r2, ISO\/IEC 27035, ISO\/IEC 27001, and FIRST. This operating model enables a structured, agile, and constantly evolving response to cybersecurity incidents, protecting critical technological environments of the organization and its customers. RFC \u2013 Request for CommentsAt Bigfive, our RFC is a key document for managing cybersecurity incidents and cases, aligned with the standards required by FIRST and international best practices. This formal mechanism allows us to record, evaluate, and follow up on critical situations, ensuring traceability, transparency, and continuous improvement in our response processes.Download it and learn how we strengthen the digital security of our organization and that of our clients. Download RFC document<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1952","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CSIRT - Bigfive<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bigfive.net\/es\/csirt\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CSIRT - Bigfive\" \/>\n<meta property=\"og:description\" content=\"The Big Five of the CSIRT Cybersecurity Incident Response Team At Bigfive, we have a dedicated cybersecurity incident management and response team (CSIRT), available 24\/7. The CSIRT works in coordination with our Security Operations Center (SOC) to ensure comprehensive protection, responding quickly and accurately to any threat and continuously strengthening the resilience of our clients&#8217; critical technology environments and our own infrastructure. Bigfive&#8217;s CSIRT is governed by internationally recognized best practices and guidelines, inspired by frameworks such as NIST SP 800-61r2, ISO\/IEC 27035, ISO\/IEC 27001, and FIRST. This operating model enables a structured, agile, and constantly evolving response to cybersecurity incidents, protecting critical technological environments of the organization and its customers. RFC \u2013 Request for CommentsAt Bigfive, our RFC is a key document for managing cybersecurity incidents and cases, aligned with the standards required by FIRST and international best practices. This formal mechanism allows us to record, evaluate, and follow up on critical situations, ensuring traceability, transparency, and continuous improvement in our response processes.Download it and learn how we strengthen the digital security of our organization and that of our clients. Download RFC document\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bigfive.net\/es\/csirt\/\" \/>\n<meta property=\"og:site_name\" content=\"Bigfive\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T22:44:37+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-scaled.webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/csirt\\\/\",\"url\":\"https:\\\/\\\/www.bigfive.net\\\/csirt\\\/\",\"name\":\"CSIRT - Bigfive\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/csirt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/csirt\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.bigfive.net\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/especialistas-profesionales-scaled.webp\",\"datePublished\":\"2025-12-20T21:48:38+00:00\",\"dateModified\":\"2025-12-20T22:44:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/csirt\\\/#breadcrumb\"},\"inLanguage\":\"es-DO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bigfive.net\\\/csirt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-DO\",\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/csirt\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.bigfive.net\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/especialistas-profesionales-scaled.webp\",\"contentUrl\":\"http:\\\/\\\/www.bigfive.net\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/especialistas-profesionales-scaled.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/csirt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.bigfive.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CSIRT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/#website\",\"url\":\"https:\\\/\\\/www.bigfive.net\\\/\",\"name\":\"Bigfive\",\"description\":\"Protecci&oacute;n en ciberseguridad para Sistemas, Redes y Datos\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/#organization\"},\"alternateName\":\"https:\\\/\\\/bigfive.net\\\/\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bigfive.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-DO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/#organization\",\"name\":\"Bigfive\",\"alternateName\":\"https:\\\/\\\/www.bigfive.net\\\/\",\"url\":\"https:\\\/\\\/www.bigfive.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-DO\",\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/bigfive.net\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Bigfive-logo.webp\",\"contentUrl\":\"http:\\\/\\\/bigfive.net\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Bigfive-logo.webp\",\"width\":2311,\"height\":2310,\"caption\":\"Bigfive\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bigfive.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CSIRT - Bigfive","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bigfive.net\/es\/csirt\/","og_locale":"es_ES","og_type":"article","og_title":"CSIRT - Bigfive","og_description":"The Big Five of the CSIRT Cybersecurity Incident Response Team At Bigfive, we have a dedicated cybersecurity incident management and response team (CSIRT), available 24\/7. The CSIRT works in coordination with our Security Operations Center (SOC) to ensure comprehensive protection, responding quickly and accurately to any threat and continuously strengthening the resilience of our clients&#8217; critical technology environments and our own infrastructure. Bigfive&#8217;s CSIRT is governed by internationally recognized best practices and guidelines, inspired by frameworks such as NIST SP 800-61r2, ISO\/IEC 27035, ISO\/IEC 27001, and FIRST. This operating model enables a structured, agile, and constantly evolving response to cybersecurity incidents, protecting critical technological environments of the organization and its customers. RFC \u2013 Request for CommentsAt Bigfive, our RFC is a key document for managing cybersecurity incidents and cases, aligned with the standards required by FIRST and international best practices. This formal mechanism allows us to record, evaluate, and follow up on critical situations, ensuring traceability, transparency, and continuous improvement in our response processes.Download it and learn how we strengthen the digital security of our organization and that of our clients. Download RFC document","og_url":"https:\/\/www.bigfive.net\/es\/csirt\/","og_site_name":"Bigfive","article_modified_time":"2025-12-20T22:44:37+00:00","og_image":[{"url":"http:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-scaled.webp","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bigfive.net\/csirt\/","url":"https:\/\/www.bigfive.net\/csirt\/","name":"CSIRT - Bigfive","isPartOf":{"@id":"https:\/\/www.bigfive.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bigfive.net\/csirt\/#primaryimage"},"image":{"@id":"https:\/\/www.bigfive.net\/csirt\/#primaryimage"},"thumbnailUrl":"http:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-scaled.webp","datePublished":"2025-12-20T21:48:38+00:00","dateModified":"2025-12-20T22:44:37+00:00","breadcrumb":{"@id":"https:\/\/www.bigfive.net\/csirt\/#breadcrumb"},"inLanguage":"es-DO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bigfive.net\/csirt\/"]}]},{"@type":"ImageObject","inLanguage":"es-DO","@id":"https:\/\/www.bigfive.net\/csirt\/#primaryimage","url":"http:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-scaled.webp","contentUrl":"http:\/\/www.bigfive.net\/wp-content\/uploads\/2025\/08\/especialistas-profesionales-scaled.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bigfive.net\/csirt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bigfive.net\/"},{"@type":"ListItem","position":2,"name":"CSIRT"}]},{"@type":"WebSite","@id":"https:\/\/www.bigfive.net\/#website","url":"https:\/\/www.bigfive.net\/","name":"Bigfive","description":"Protecci&oacute;n en ciberseguridad para Sistemas, Redes y Datos","publisher":{"@id":"https:\/\/www.bigfive.net\/#organization"},"alternateName":"https:\/\/bigfive.net\/","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bigfive.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-DO"},{"@type":"Organization","@id":"https:\/\/www.bigfive.net\/#organization","name":"Bigfive","alternateName":"https:\/\/www.bigfive.net\/","url":"https:\/\/www.bigfive.net\/","logo":{"@type":"ImageObject","inLanguage":"es-DO","@id":"https:\/\/www.bigfive.net\/#\/schema\/logo\/image\/","url":"http:\/\/bigfive.net\/wp-content\/uploads\/2024\/11\/Bigfive-logo.webp","contentUrl":"http:\/\/bigfive.net\/wp-content\/uploads\/2024\/11\/Bigfive-logo.webp","width":2311,"height":2310,"caption":"Bigfive"},"image":{"@id":"https:\/\/www.bigfive.net\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.bigfive.net\/es\/wp-json\/wp\/v2\/pages\/1952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bigfive.net\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bigfive.net\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bigfive.net\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bigfive.net\/es\/wp-json\/wp\/v2\/comments?post=1952"}],"version-history":[{"count":8,"href":"https:\/\/www.bigfive.net\/es\/wp-json\/wp\/v2\/pages\/1952\/revisions"}],"predecessor-version":[{"id":1963,"href":"https:\/\/www.bigfive.net\/es\/wp-json\/wp\/v2\/pages\/1952\/revisions\/1963"}],"wp:attachment":[{"href":"https:\/\/www.bigfive.net\/es\/wp-json\/wp\/v2\/media?parent=1952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}