{"id":25817,"date":"2026-01-29T10:00:00","date_gmt":"2026-01-29T09:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=25817"},"modified":"2026-03-11T17:27:07","modified_gmt":"2026-03-11T16:27:07","slug":"cybersecurity-2026","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/cybersecurity-2026\/","title":{"rendered":"Cybersecurity 2026"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"25817\" class=\"elementor elementor-25817\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-532d0d20 e-con-full e-flex e-con e-parent\" data-id=\"532d0d20\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fe7f8fd elementor-widget elementor-widget-text-editor\" data-id=\"3fe7f8fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Prioritize, protect identity and remain flexible<\/strong><\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<div>\n<p>IT security managers face growing challenges in cybersecurity in 2026: The number of newly discovered security vulnerabilities is rising continuously, while budgets, time and specialist staff remain limited. Cloud services, hybrid infrastructures and complex supply chains are expanding the digital attack surface and increasing the pressure on companies to act. What can be done?<\/p>\n<p>Here are a few tips on how you can make your company more resistant to hacker attacks:<\/p>\n<\/div>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h3 style=\"font-weight: 400;\"><span style=\"color: #000000;\"><strong>1. prioritize instead of simply identifying weak points<\/strong><\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<div>\n<p>A single vulnerability scan reveals technical gaps, but rarely provides a basis for decision-making. Not every vulnerability is equally relevant - the decisive factor is whether it is accessible, exploitable and part of active attack campaigns.<\/p>\n<p>Modern exposure management approaches such as the <a href=\"https:\/\/defenderbox.de\/en\/product\/\" target=\"_blank\" rel=\"noopener\">DEFENDERBOX<\/a> combine attack surface management, vulnerability data and AI-supported threat intelligence to create a realistic overall picture.<\/p>\n<\/div>\n<h3><span style=\"color: #000000;\">2. identity as a strategic foundation<\/span><\/h3>\n<div>\n<p>Identity security will become the core of modern cyber defense in 2026.<\/p>\n<p>Human and non-human identities define who gets access and how security decisions are made.<\/p>\n<p>Attackers are increasingly relying on compromised access data, as this is the fastest way to gain access to company networks. Continuous verification of credentials, multi-factor authentication and clear authorization structures are becoming a key element of modern security strategies.<\/p>\n<\/div>\n<h3><span style=\"color: #000000;\">3. hybrid authentication and operational threat intelligence<\/span><\/h3>\n<div>\n<p>Passwords are not disappearing, but hybrid authentication models are gaining ground.<\/p>\n<p>Threat intelligence is directly integrated into operational security decisions: Real-time information on compromised access data or new attack patterns flows directly into prevention, prioritization and incident response.<\/p>\n<\/div>\n<h3><span style=\"color: #000000;\">4. automation with clear limits<\/span><\/h3>\n<div>\n<p>AI-supported analyses reduce false alarms and relieve security teams, but do not replace human expertise.<\/p>\n<p>AI pre-filtering and human decision-making responsibility continue to gain ground.<\/p>\n<\/div>\n<h3><span style=\"color: #000000;\">5. scalable, flexible, future-proof<\/span><\/h3>\n<p>In 2026, isolated individual solutions will no longer be fit for purpose. Flexible security concepts that adapt dynamically to threats and regulatory requirements will be in demand.<\/p>\n<p>Measures must be managed, prioritized and continuously developed in line with demand - away from rigid licensing models and towards sustainable cyber resilience.<\/p>\n<h3><span style=\"color: #000000;\">Conclusion<\/span><\/h3>\n<p><span data-teams=\"true\">This is precisely where the <strong>DEFENDERBOX<\/strong> Instead of isolated tools, we offer a flexible, scalable security concept that adapts dynamically to changing threat situations. <\/span><\/p>\n<p><span data-teams=\"true\">Our solution makes it possible to manage security measures as required, continuously prioritize security gaps and constantly monitor IT and OT environments. <\/span><\/p>\n<p><span data-teams=\"true\">In this way, companies not only meet current regulatory requirements, but also remain resilient for future challenges - without rigid license models and with minimal administrative effort.<\/span><\/p>\n<p><span style=\"color: #000000;\"><!-- \/wp:paragraph --><!-- wp:image {\"id\":17611,\"width\":\"308px\",\"height\":\"auto\",\"sizeSlug\":\"large\",\"linkDestination\":\"none\"} --><!-- \/wp:image --><!-- wp:heading --><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Are you prepared for cyber attacks?<\/strong><\/span><\/p>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>With the\u00a0<a href=\"https:\/\/defenderbox.de\/en\/product\/\"><strong>DEFENDERBOX<\/strong><\/a>\u00a0you are one step ahead of cyber threats: Strengthen your company's resistance to hacker attacks - even in your own environment!<\/p>\n<!-- \/wp:buttons --><!-- wp:heading -->\n<p><strong>Stay vigilant - your IT will stay that way with us!<\/strong><\/p>\n<div>\n<p>\u27a1\ufe0f\u00a0<a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noopener\">Test now<\/a><br \/>\u27a1\ufe0f <a href=\"https:\/\/defenderbox.de\/en\/partner\/\" target=\"_blank\" rel=\"noopener\">Become a partner<\/a><br \/>\u27a1\ufe0f\u00a0<a href=\"https:\/\/defenderbox.de\/en\/career\/\" target=\"_blank\" rel=\"noopener\">Career with us<\/a><\/p>\n<\/div>\n<!-- \/wp:image --><!-- wp:paragraph --><!-- \/wp:paragraph --><!-- wp:separator {\"className\":\"is-style-wide\",\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|x-small\",\"bottom\":\"var:preset|spacing|x-small\"}}},\"backgroundColor\":\"tertiary\"} --><!-- \/wp:columns --><!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity will no longer be an IT issue in 2026 - it will be strategic risk management. If you know your \u201ebusiness blast radius\u201c, you can actively limit damage.<\/p>","protected":false},"author":3,"featured_media":26435,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,40,42,37,36,50],"class_list":["post-25817","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-ihk-siegen","tag-schwachstellen","tag-sicherheitsluecken","tag-webinar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity 2026 - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"Mit DEFENDERBOX IT-Sicherheit st\u00e4rken: Sch\u00fctzen Sie Ihr Unternehmen proaktiv vor Hackerangriffen \u2013 \u00fcberall, auch in Ihrer eigenen IT-Umgebung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/cybersecurity-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity 2026 - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"Mit DEFENDERBOX IT-Sicherheit st\u00e4rken: Sch\u00fctzen Sie Ihr Unternehmen proaktiv vor Hackerangriffen \u2013 \u00fcberall, auch in Ihrer eigenen IT-Umgebung.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/cybersecurity-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T16:27:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Cybersecurity 2026\",\"datePublished\":\"2026-01-29T09:00:00+00:00\",\"dateModified\":\"2026-03-11T16:27:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/\"},\"wordCount\":402,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Cybersec-Blog.webp\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"IHK Siegen\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\",\"Webinar\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/\",\"name\":\"Cybersecurity 2026 - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Cybersec-Blog.webp\",\"datePublished\":\"2026-01-29T09:00:00+00:00\",\"dateModified\":\"2026-03-11T16:27:07+00:00\",\"description\":\"Mit DEFENDERBOX IT-Sicherheit st\u00e4rken: Sch\u00fctzen Sie Ihr Unternehmen proaktiv vor Hackerangriffen \u2013 \u00fcberall, auch in Ihrer eigenen IT-Umgebung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Cybersec-Blog.webp\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Cybersec-Blog.webp\",\"width\":1344,\"height\":768,\"caption\":\"DEFeNDERBOX - TITEL NEWS - CYBERSEC BLOG\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersecurity-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity 2026 - DEFENDERBOX","description":"Strengthen IT security with DEFENDERBOX: Protect your company proactively against hacker attacks - everywhere, even in your own IT environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/cybersecurity-2026\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity 2026 - DEFENDERBOX","og_description":"Mit DEFENDERBOX IT-Sicherheit st\u00e4rken: Sch\u00fctzen Sie Ihr Unternehmen proaktiv vor Hackerangriffen \u2013 \u00fcberall, auch in Ihrer eigenen IT-Umgebung.","og_url":"https:\/\/defenderbox.de\/en\/cybersecurity-2026\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2026-01-29T09:00:00+00:00","article_modified_time":"2026-03-11T16:27:07+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog.webp","type":"image\/webp"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Cybersecurity 2026","datePublished":"2026-01-29T09:00:00+00:00","dateModified":"2026-03-11T16:27:07+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/"},"wordCount":402,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog.webp","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","IHK Siegen","Schwachstellen","Sicherheitsl\u00fccken","Webinar"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/","url":"https:\/\/defenderbox.de\/cybersecurity-2026\/","name":"Cybersecurity 2026 - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog.webp","datePublished":"2026-01-29T09:00:00+00:00","dateModified":"2026-03-11T16:27:07+00:00","description":"Strengthen IT security with DEFENDERBOX: Protect your company proactively against hacker attacks - everywhere, even in your own IT environment.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/cybersecurity-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog.webp","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog.webp","width":1344,"height":768,"caption":"DEFeNDERBOX - TITEL NEWS - CYBERSEC BLOG"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/cybersecurity-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity 2026"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/25817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=25817"}],"version-history":[{"count":3,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/25817\/revisions"}],"predecessor-version":[{"id":27145,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/25817\/revisions\/27145"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/26435"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=25817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=25817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=25817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}