{"id":34674,"date":"2023-10-09T06:13:00","date_gmt":"2023-10-09T13:13:00","guid":{"rendered":"https:\/\/pathlock.com\/?post_type=resource&#038;p=34674"},"modified":"2026-01-26T08:27:19","modified_gmt":"2026-01-26T13:27:19","slug":"cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie","status":"publish","type":"resource","link":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/","title":{"rendered":"Cybersecurity auf Applikationsebene. Der blinde Fleck in der Sicherheitsstrategie"},"content":{"rendered":"\n<p>In vielen Unternehmen werden Buzzwords wie Zero Trust, Microsegmentierung oder Software Defined Networks als Allheilmittel f\u00fcr die Absicherung ihrer IT-Systeme angesehen. Dabei wird aber oft vergessen, dass elementare Grundlagen wie Asset &amp; Application Management, IT Security Management System sowie der Aufbau einer echten IT-Security-Kompetenz noch nicht abgeschlossen sind oder schlimmer, noch nicht einmal begonnen haben. Gerade der k\u00fcrzlich bekannt gewordene Microsoft Hack, bei dem der \u201eGeneralschl\u00fcssel\u201c zur Azure Cloud und damit zu allen Kundensystemen erbeutet wurde, zeigt, dass blindes Vertrauen in die Infrastruktur und das Identity &amp; Account Management der gro\u00dfen Hyperscaler sehr schnell zu gravierenden Sicherheitsl\u00fccken f\u00fchren kann. <\/p>\n\n\n\n<p>Wir zeigen, wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren und durch gezieltes Monitoring Bedrohungen fr\u00fchzeitig erkennen, bevor sie zu katastrophalen Schadensf\u00e4llen werden.<\/p>\n\n\n\n<p><strong>Veranstaltung:<\/strong> Thought Leadership in der IT | <a href=\"http:\/\/www.it-daily.net\">www.it-daily.net<\/a><\/p>\n\n\n\n<p><strong>Referent<\/strong>:\u200b <strong><a href=\"https:\/\/pathlock.com\/de\/about\/\">Ralf Kempf<\/a>,<\/strong> Gesch\u00e4ftsf\u00fchrer Pathlock Deutschland<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Weitere Informationen erfahren Sie in unserem <a href=\"https:\/\/pathlock.com\/de\/cybersicherheit-auf-applikationsebene-warum-hyperscaler-kein-allheilmittel-sind\/\">Blogbeitrag<\/a> und im <a href=\"https:\/\/pathlock.com\/de\/piyush-pandey-ueber-die-neugestaltung-der-application-access-governance\/\">Interview<\/a> mit unserem CEO.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In vielen Unternehmen werden Buzzwords wie Zero Trust, Microsegmentierung oder Software Defined Networks als Allheilmittel f\u00fcr die Absicherung ihrer IT-Systeme angesehen. Dabei wird aber oft vergessen, dass elementare Grundlagen wie Asset &amp; Application Management, IT Security Management System sowie der Aufbau einer echten IT-Security-Kompetenz noch nicht abgeschlossen sind oder schlimmer, noch nicht einmal begonnen haben&#8230;.<\/p>\n","protected":false},"author":59,"featured_media":34899,"parent":0,"template":"","categories":[],"content_type":[158],"topic":[444],"erp-solutions":[241,442],"magazines":[],"analyst-firm":[],"class_list":["post-34674","resource","type-resource","status-publish","has-post-thumbnail","hentry","content_type-on-demand-webinar","topic-application-security","erp-solutions-pathlock-cloud","erp-solutions-sap"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Thought Leadership in der IT: Lernen Sie von Ralf Kempf<\/title>\n<meta name=\"description\" content=\"Wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Thought Leadership in der IT - Lernen Sie von den Besten!\" \/>\n<meta property=\"og:description\" content=\"Wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-26T13:27:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1458\" \/>\n\t<meta property=\"og:image:height\" content=\"833\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Thought Leadership in der IT - Lernen Sie von den Besten!\" \/>\n<meta name=\"twitter:description\" content=\"Wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\\\/\",\"name\":\"Thought Leadership in der IT: Lernen Sie von Ralf Kempf\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ThoughtLeaderIT_Kempf_700x400.png\",\"datePublished\":\"2023-10-09T13:13:00+00:00\",\"dateModified\":\"2026-01-26T13:27:19+00:00\",\"description\":\"Wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ThoughtLeaderIT_Kempf_700x400.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ThoughtLeaderIT_Kempf_700x400.png\",\"width\":1458,\"height\":833,\"caption\":\"ThoughtLeaderIT_Ralf-Kempf\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity auf Applikationsebene. Der blinde Fleck in der Sicherheitsstrategie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Thought Leadership in der IT: Lernen Sie von Ralf Kempf","description":"Wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/","og_locale":"de_DE","og_type":"article","og_title":"Thought Leadership in der IT - Lernen Sie von den Besten!","og_description":"Wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.","og_url":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/","og_site_name":"Pathlock","article_modified_time":"2026-01-26T13:27:19+00:00","og_image":[{"width":1458,"height":833,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Thought Leadership in der IT - Lernen Sie von den Besten!","twitter_description":"Wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.","twitter_image":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png","twitter_site":"@pathlock","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/","url":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/","name":"Thought Leadership in der IT: Lernen Sie von Ralf Kempf","isPartOf":{"@id":"https:\/\/pathlock.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/#primaryimage"},"image":{"@id":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/#primaryimage"},"thumbnailUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png","datePublished":"2023-10-09T13:13:00+00:00","dateModified":"2026-01-26T13:27:19+00:00","description":"Wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.","breadcrumb":{"@id":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/#primaryimage","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png","width":1458,"height":833,"caption":"ThoughtLeaderIT_Ralf-Kempf"},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/de\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity auf Applikationsebene. Der blinde Fleck in der Sicherheitsstrategie"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/de\/#website","url":"https:\/\/pathlock.com\/de\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/de\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]}]}},"ACF":{"hero_image":{"ID":34899,"id":34899,"title":"ThoughtLeaderIT_Ralf-Kempf","filename":"ThoughtLeaderIT_Kempf_700x400.png","filesize":550354,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png","link":"https:\/\/pathlock.com\/de\/resource\/cybersecurity-auf-applikationsebene-der-blinde-fleck-in-der-sicherheitsstrategie\/thoughtleaderit_kempf_700x400\/","alt":"ThoughtLeaderIT_Ralf-Kempf","author":"39","description":"ThoughtLeaderIT_Ralf-Kempf","caption":"","name":"thoughtleaderit_kempf_700x400","status":"inherit","uploaded_to":34674,"date":"2023-09-26 12:01:50","modified":"2023-09-26 12:02:17","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/pathlock.com\/wp-includes\/images\/media\/default.png","width":1458,"height":833,"sizes":{"thumbnail":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400-150x150.png","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400-300x171.png","medium-width":300,"medium-height":171,"medium_large":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400-768x439.png","medium_large-width":768,"medium_large-height":439,"large":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400-1024x585.png","large-width":1024,"large-height":585,"1536x1536":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png","1536x1536-width":1458,"1536x1536-height":833,"2048x2048":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400.png","2048x2048-width":1458,"2048x2048-height":833,"menu-nav-img":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400-112x112.png","menu-nav-img-width":112,"menu-nav-img-height":112,"menu-nav-img-company":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400-292x138.png","menu-nav-img-company-width":292,"menu-nav-img-company-height":138,"big-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400-724x435.png","big-promoted-resoruces-post-width":724,"big-promoted-resoruces-post-height":435,"small-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/09\/ThoughtLeaderIT_Kempf_700x400-294x178.png","small-promoted-resoruces-post-width":294,"small-promoted-resoruces-post-height":178}},"is_section_explore_industry_thought_leadership":true,"case_study":"resource","video_or_pdf_download":"video","intro_details_page":"Lernen Sie, wie Sie mit einfachen, aber wirkungsvollen Ma\u00dfnahmen eine sichere IT-Anwendungsumgebung mit erh\u00f6hter Angriffsresistenz etablieren.","youtube_embed_src":"https:\/\/www.youtube-nocookie.com\/embed\/_y1gjQe---g","video_cover":false,"video_duration":"27 min.","form_id":"47ee773f-35fc-41fc-a47e-8da0fa01b568","sfdc_campaign_id":""},"_links":{"self":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource\/34674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/users\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media\/34899"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media?parent=34674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/categories?post=34674"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/content_type?post=34674"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/topic?post=34674"},{"taxonomy":"erp-solutions","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/erp-solutions?post=34674"},{"taxonomy":"magazines","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/magazines?post=34674"},{"taxonomy":"analyst-firm","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/analyst-firm?post=34674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}