{"version":"1.0","provider_name":"TECH-ARROW","provider_url":"https:\/\/www.tech-arrow.com\/de\/","author_name":"Edit Bal\u00e1zsy Cs\u00f3ka","author_url":"https:\/\/www.tech-arrow.com\/de\/author\/eba\/","title":"Die gr\u00f6\u00dfte H\u00fcrde der Cybersicherheit - TECH-ARROW","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UNbcvEZQ5p\"><a href=\"https:\/\/www.tech-arrow.com\/de\/2025\/03\/19\/die-groesste-huerde-der-cybersicherheit\/\">Die gr\u00f6\u00dfte H\u00fcrde der Cybersicherheit<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tech-arrow.com\/de\/2025\/03\/19\/die-groesste-huerde-der-cybersicherheit\/embed\/#?secret=UNbcvEZQ5p\" width=\"600\" height=\"338\" title=\"&#8222;Die gr\u00f6\u00dfte H\u00fcrde der Cybersicherheit&#8220; &#8211; TECH-ARROW\" data-secret=\"UNbcvEZQ5p\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.tech-arrow.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.tech-arrow.com\/wp-content\/uploads\/2025\/03\/cybersicherheit-de.png","thumbnail_width":1280,"thumbnail_height":720,"description":"Cybersicherheit ist ein brisantes Thema und taucht immer wieder in den Mainstream Branchennachrichten auf, wenn es zu einem gro\u00df angelegten Ausfall kommt. Warum wird also weiterhin so wenig in sie investiert? Die Antwort ist leider die gr\u00f6\u00dfte H\u00fcrde der Cybersicherheit."}