{"id":954,"date":"2026-02-16T06:50:08","date_gmt":"2026-02-16T06:50:08","guid":{"rendered":"https:\/\/pickplace-rtjzvn2oa4.live-website.com\/?page_id=954"},"modified":"2026-03-30T15:56:32","modified_gmt":"2026-03-30T15:56:32","slug":"embedded-systems-cyber-security","status":"publish","type":"page","link":"https:\/\/www.pickplace.de\/de\/embedded-systems-cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div class=\"wp-block-stackable-columns alignwide stk-block-columns stk-block stk-f5554c3 stk-block-background stk--has-background-overlay\" data-block-id=\"f5554c3\"><style>.stk-f5554c3 {background-color:#3c2204 !important;background-image:url(https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/02\/hardware-entwicklung-pickplace-bg-2000.jpg) !important;background-position:center center !important;background-repeat:no-repeat !important;background-size:cover !important;border-top-left-radius:25px !important;border-top-right-radius:25px !important;border-bottom-right-radius:25px !important;border-bottom-left-radius:25px !important;overflow:hidden !important;padding-top:180px !important;padding-right:80px !important;padding-bottom:60px !important;padding-left:80px !important;margin-bottom:0px !important;}.stk-f5554c3:before{background-color:#3c2204 !important;opacity:0.3 !important;}@media screen and (max-width:689px){.stk-f5554c3 {padding-top:100px !important;padding-right:25px !important;padding-left:25px !important;}}<\/style><div class=\"stk-row stk-inner-blocks has-text-align-center-mobile stk-block-content stk-content-align stk-f5554c3-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-3f739b8\" data-v=\"4\" data-block-id=\"3f739b8\"><style>.stk-3f739b8-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-3f739b8-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-3f739b8-inner-blocks\">\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-99f93f5\" id=\"cyber-security\" data-block-id=\"99f93f5\"><style>.stk-99f93f5 {max-width:45% !important;min-width:auto !important;margin-bottom:50px !important;}.stk-99f93f5 .stk-block-heading__text{font-size:60px !important;color:var(--theme-palette-color-6, #f9fafb) !important;line-height:1.1em !important;}@media screen and (max-width:999px){.stk-99f93f5 {max-width:100% !important;min-width:auto !important;}.stk-99f93f5 .stk-block-heading__text{font-size:40px !important;}}@media screen and (max-width:689px){.stk-99f93f5 {margin-bottom:35px !important;}.stk-99f93f5 .stk-block-heading__text{font-size:30px !important;}}<\/style><h2 class=\"stk-block-heading__text has-text-color has-palette-color-8-color\">Cyber Security<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-b536dc7 stk-block-background\" data-block-id=\"b536dc7\"><style>.stk-b536dc7 .stk--block-align-b536dc7{align-items:flex-start !important;}.stk-b536dc7 {background-color:var(--theme-palette-color-6, #f9fafb) !important;border-top-left-radius:25px !important;border-top-right-radius:25px !important;border-bottom-right-radius:25px !important;border-bottom-left-radius:25px !important;overflow:hidden !important;padding-top:60px !important;padding-right:35px !important;padding-bottom:60px !important;padding-left:35px !important;margin-bottom:0px !important;}.stk-b536dc7:before{background-color:var(--theme-palette-color-6, #f9fafb) !important;}.stk-b536dc7-column{--stk-column-gap:35px !important;row-gap:35px !important;}@media screen and (max-width:689px){.stk-b536dc7 {padding-top:40px !important;padding-right:25px !important;padding-bottom:40px !important;padding-left:25px !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-b536dc7 stk-block-content stk-content-align stk-b536dc7-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-cdfd108\" data-v=\"4\" data-block-id=\"cdfd108\"><style>.stk-cdfd108-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}@media screen and (min-width:690px){.stk-cdfd108 {flex:var(--stk-flex-grow, 1) 1 calc(7.1% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-cdfd108-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center stk-block-content stk-inner-blocks stk-cdfd108-inner-blocks\">\n<div class=\"wp-block-stackable-image stk-block-image has-text-align-left has-text-align-center-mobile stk-block stk-b822f45\" data-block-id=\"b822f45\"><style>.stk-b822f45 .stk-img-wrapper{width:64px !important;}@media screen and (max-width:999px){.stk-b822f45 {margin-bottom:40px !important;}.stk-b822f45 .stk-img-wrapper{width:65px !important;}}<\/style><figure><span class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-789\" src=\"https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/02\/ball4.svg\" width=\"1623\" height=\"1646\"\/><\/span><\/figure><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-c12b2b3\" data-v=\"4\" data-block-id=\"c12b2b3\"><style>@media screen and (min-width:690px){.stk-c12b2b3 {flex:var(--stk-flex-grow, 1) 1 calc(77.7% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-c12b2b3-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-c12b2b3-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-23b4d77\" data-block-id=\"23b4d77\"><style>.stk-23b4d77 {margin-bottom:11px !important;}.stk-23b4d77 .stk-block-text__text{font-size:var(--stk--preset--font-size--medium, 20px) !important;}@media screen and (max-width:999px){.stk-23b4d77 .stk-block-text__text{font-size:var(--stk--preset--font-size--medium, 20px) !important;}}<\/style><p class=\"stk-block-text__text has-text-align-left\">Embedded Systems Cyber Security ist f&#xFC;r die zuverl&#xE4;ssigen Betrieb in Zeiten hybrider Bedrohungen von High-Tech-Elektronik entscheidend. In sicherheitskritischen Bereichen m&#xFC;ssen elektronische Systeme vor Angriffen von Hackern und Black Hats gesch&#xFC;tzt werden. Eine vorausschauende und strukturelle Herangehensweise, die Risiken und Angriffvektoren strategisch analysiert, ist daher unverzichtbar.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-ceae565\" data-v=\"4\" data-block-id=\"ceae565\"><style>@media screen and (min-width:690px){.stk-ceae565 {flex:var(--stk-flex-grow, 1) 1 calc(15.2% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-ceae565-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-ceae565-inner-blocks\"><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-ae760d9\" data-block-id=\"ae760d9\"><style>.stk-ae760d9 {height:150px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-2ef8d74\" data-block-id=\"2ef8d74\"><style>.stk-2ef8d74 .stk--block-align-2ef8d74{align-items:center !important;}.stk-2ef8d74 {margin-bottom:0px !important;}.stk-2ef8d74-column{--stk-column-gap:70px !important;row-gap:50px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-2ef8d74 stk-block-content stk-content-align stk-2ef8d74-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-b3ddcb3\" data-v=\"4\" data-block-id=\"b3ddcb3\"><style>.stk-b3ddcb3-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-b3ddcb3-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center-mobile stk-block-content stk-inner-blocks stk-b3ddcb3-inner-blocks\">\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-2fbd800 stk-block-background stk--has-background-overlay\" data-block-id=\"2fbd800\"><style>.stk-2fbd800 {height:400px !important;background-image:url(https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/02\/bg-cyber-security-embedded-systems-800.jpg) !important;border-top-left-radius:var(--stk--preset--border-radius--xx-large, 32px) !important;border-top-right-radius:var(--stk--preset--border-radius--xx-large, 32px) !important;border-bottom-right-radius:var(--stk--preset--border-radius--xx-large, 32px) !important;border-bottom-left-radius:var(--stk--preset--border-radius--xx-large, 32px) !important;overflow:hidden !important;}<\/style><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-425a78d\" data-v=\"4\" data-block-id=\"425a78d\"><style>.stk-425a78d-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}@media screen and (max-width:999px){.stk-425a78d-container{padding-left:0px !important;}}@media screen and (max-width:689px){.stk-425a78d-container{padding-left:0px !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-425a78d-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center-mobile stk-block-content stk-inner-blocks stk-425a78d-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-77d462d\" data-block-id=\"77d462d\"><style>.stk-77d462d {margin-bottom:16px !important;}.stk-77d462d .stk-block-text__text{color:var(--theme-palette-color-4, #000000) !important;font-weight:600 !important;text-transform:uppercase !important;}<\/style><p class=\"stk-block-text__text has-text-color has-palette-color-4-color\"><strong>Embedded Cyber Security&#xA0;<\/strong><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-cab0231\" id=\"gefahren-fur-elektronik-erkennen-und-risiken-minimieren\" data-block-id=\"cab0231\"><style>.stk-cab0231 {margin-bottom:8px !important;}.stk-cab0231 .stk-block-heading__text{line-height:1.5em !important;font-weight:800 !important;}@media screen and (max-width:999px){.stk-cab0231 .stk-block-heading__text{font-size:30px !important;}}@media screen and (max-width:689px){.stk-cab0231 .stk-block-heading__text{font-size:25px !important;}}<\/style><h2 class=\"stk-block-heading__text\">Gefahren f&#xFC;r Elektronik erkennen und Risiken minimieren<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-15dcdba\" data-block-id=\"15dcdba\"><style>.stk-15dcdba {margin-bottom:8px !important;}@media screen and (max-width:689px){.stk-15dcdba {margin-bottom:35px !important;}}<\/style><p class=\"stk-block-text__text\">Im Zentrum unserer Arbeit steht ein ganzheitlicher Sicherheitsansatz, der auf die Identifikation und Minderung von Risiken abzielt. Durch Schwachstellenanalysen und die Implementierung von Sicherheitsmechanismen machen wir Systeme widerstandsf&#xE4;hig gegen Bedrohungen und sichern die Integrit&#xE4;t der Kommunikationsteilnehmer. <\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-e632a3f\" data-block-id=\"e632a3f\"><p class=\"stk-block-text__text\">Dabei legen wir besonderen Wert auf die Absicherung von Datenverkehr, den Schutz sensibler Daten und die Robustheit der Hardware-Peripherie. Cyber Security ist f&#xFC;r uns mehr als nur Schutzma&#xDF;nahmen &#x2013; es ist ein durchdachter Prozess, der den gesamten Lebenszyklus des Produkts begleitet.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list has-text-color stk-block stk-7be197c\" data-block-id=\"7be197c\"><style>.stk-7be197c {--stk-icon-list-column-count:3 !important;--stk-icon-list-row-gap:12px !important;}.stk-7be197c ul li, .stk-7be197c ol li, .stk-7be197c ul li span, .stk-7be197c ol li span{color:var(--theme-palette-color-8, #0F7173) !important;font-weight:bold !important;}<\/style><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-7be197c\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M470.6 278.6c12.5-12.5 12.5-32.8 0-45.3l-160-160c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3L402.7 256 265.4 393.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0l160-160zm-352 160l160-160c12.5-12.5 12.5-32.8 0-45.3l-160-160c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3L210.7 256 73.4 393.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0z\"><\/path><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-927169d\" data-block-id=\"927169d\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Threat Analysis und Risk Assessment<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-e179208\" data-block-id=\"e179208\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Penetration Tests<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-a7d2588\" data-block-id=\"a7d2588\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Security Hardening<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-d18a574\" data-block-id=\"d18a574\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Software Update Management<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-645f3ea\" data-block-id=\"645f3ea\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Software Bill of Materials<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-f3aca04\" data-block-id=\"f3aca04\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Secure Software Development<\/span><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-e8ec600\" data-block-id=\"e8ec600\"><style>.stk-e8ec600 {height:150px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-7e7d25a stk-block-background stk--has-background-overlay\" data-block-id=\"7e7d25a\"><style>.stk-7e7d25a .stk--block-align-7e7d25a{align-items:center !important;}.stk-7e7d25a {background-image:url(https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/02\/platine-pcb-design-stecker-emv-bg-1200-rotated.jpg) !important;min-height:400px !important;align-items:center !important;padding-top:var(--stk--preset--spacing--70, 3.38rem) !important;padding-right:var(--stk--preset--spacing--70, 3.38rem) !important;padding-bottom:var(--stk--preset--spacing--70, 3.38rem) !important;padding-left:var(--stk--preset--spacing--70, 3.38rem) !important;margin-bottom:0px !important;display:flex !important;}.stk-7e7d25a:before{background-color:#000000 !important;opacity:0.5 !important;}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-7e7d25a stk-block-content stk-content-align stk-7e7d25a-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-ad09fbb\" data-v=\"4\" data-block-id=\"ad09fbb\"><style>@media screen and (min-width:690px){.stk-ad09fbb {flex:var(--stk-flex-grow, 1) 1 calc(40.099999999999994% - var(--stk-column-gap, 0px) * 1 \/ 2 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-ad09fbb-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-ad09fbb-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-3bbd84d\" id=\"heading-placeholder\" data-block-id=\"3bbd84d\"><style>.stk-3bbd84d .stk-block-heading__text{color:#ffffff !important;}<\/style><h2 class=\"stk-block-heading__text has-text-color\">Cyber Security Technologien f&#xFC;r Embedded Systems<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-657fac7\" data-block-id=\"657fac7\"><style>.stk-657fac7 {margin-bottom:10px !important;}.stk-657fac7 .stk-block-text__text{color:#ffffff !important;}<\/style><p class=\"stk-block-text__text has-text-color\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Wir setzen auf moderne Technologien und Werkzeuge, die eine umfassende Absicherung von Embedded Systems erm&#xF6;glichen. Embedded Cyber Security ist somit ein Ansatz, der branchen&#xFC;bliche Standards mit Sicherheitsmechanismen aus der IT und OT vereint.&#xA0;<\/span><\/p><\/div>\n\n\n\n<p><span style=\"color: #ffffff;\" class=\"stk-highlight\">Damit k&#xF6;nnen anspruchsvolle Sicherheitsanforderungen f&#xFC;r Elektronik und Devices&#xA0;erf&#xFC;llt werden. Die Grundlage unserer Arbeit bildet eine Kombination aus Software- und Hardwarel&#xF6;sungen, die h&#xF6;chsten Sicherheitsanforderungen gerecht wird.<\/span><\/p>\n\n\n\n<p><\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-349fd2d\" data-v=\"4\" data-block-id=\"349fd2d\"><style>@media screen and (min-width:690px){.stk-349fd2d {flex:var(--stk-flex-grow, 1) 1 calc(59.9% - var(--stk-column-gap, 0px) * 1 \/ 2 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-349fd2d-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-349fd2d-inner-blocks\">\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list has-text-color stk-block stk-5483e81\" data-block-id=\"5483e81\"><style>.stk-5483e81 {--stk-icon-list-column-count:2 !important;--stk-icon-list-marker-color:var(--theme-palette-color-6, #f9fafb) !important;}.stk-5483e81 ul li, .stk-5483e81 ol li, .stk-5483e81 ul li span, .stk-5483e81 ol li span{color:var(--theme-palette-color-6, #f9fafb) !important;font-weight:bold !important;}<\/style><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-5483e81\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 190 190\"><polygon points=\"173.8,28.4 60.4,141.8 15.7,97.2 5.1,107.8 60.4,163 184.4,39 173.8,28.4\"><\/polygon><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-5124f04\" data-block-id=\"5124f04\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">AES (Advanced Encryption Standard)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-a730da8\" data-block-id=\"a730da8\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">CMAC (Cipher-based Message Authentication Code)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-e0bc687\" data-block-id=\"e0bc687\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">SSH (Secure Shell)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-491b22a\" data-block-id=\"491b22a\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">TLS (Transport Layer Security)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-6d3ecbe\" data-block-id=\"6d3ecbe\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Diffie-Hellman Key Exchange<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-ae515f2\" data-block-id=\"ae515f2\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">RSA (Rivest&#x2013;Shamir&#x2013;Adleman Encryption)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-81604aa\" data-block-id=\"81604aa\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">ECDSA (Elliptic Curve Digital Signature Algorithm)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-44d9b9e\" data-block-id=\"44d9b9e\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">TRNG (True Randon Number Generators)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-d6273e0\" data-block-id=\"d6273e0\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">HMAC (Hash-based Message Authentication Code)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-2db0072\" data-block-id=\"2db0072\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">ECC (Error Correction Code)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-4eedbf4\" data-block-id=\"4eedbf4\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">ARM TrustZone<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-7d370c9\" data-block-id=\"7d370c9\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">SHA (Secure Hash Algorithm)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-2a6e2ff\" data-block-id=\"2a6e2ff\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">HTTPS (Hypertext Transfer Protocol Secure)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-a6ac416\" data-block-id=\"a6ac416\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">SSL (Secure Sockets Layer)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-73f6e73\" data-block-id=\"73f6e73\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">MQTTS (Secure MQTT)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-1e59531\" data-block-id=\"1e59531\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">DRAM Encryption<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-6888407\" data-block-id=\"6888407\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">HSMs (Hardware Security Module)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-894dc4a\" data-block-id=\"894dc4a\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">TEE (Trusted Execution Environment)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-2814069\" data-block-id=\"2814069\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Arm Confidential Compute<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-9b5c7ed\" data-block-id=\"9b5c7ed\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Secure Boot<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-5e14ec5\" data-block-id=\"5e14ec5\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">MPU (Memory Protection Unit)<\/span><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-da0933d\" data-block-id=\"da0933d\"><style>.stk-da0933d {height:148px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-74915f7\" data-block-id=\"74915f7\"><style>.stk-74915f7 .stk--block-align-74915f7{align-items:center !important;}.stk-74915f7 {margin-bottom:0px !important;}.stk-74915f7-column{--stk-column-gap:70px !important;row-gap:50px !important;}@media screen and (max-width:999px){.stk-74915f7 .stk--block-align-74915f7{align-items:flex-start !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-74915f7 stk-block-content stk-content-align stk-74915f7-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-e512f8a\" data-v=\"4\" data-block-id=\"e512f8a\"><style>.stk-e512f8a-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}@media screen and (max-width:999px){.stk-e512f8a-container{padding-right:0px !important;}}@media screen and (max-width:689px){.stk-e512f8a-container{padding-left:0px !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-e512f8a-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center-mobile stk-block-content stk-inner-blocks stk-e512f8a-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-1f7db38\" data-block-id=\"1f7db38\"><style>.stk-1f7db38 {margin-bottom:16px !important;}.stk-1f7db38 .stk-block-text__text{color:var(--theme-palette-color-4, #000000) !important;font-weight:600 !important;text-transform:uppercase !important;}<\/style><p class=\"stk-block-text__text has-text-color has-palette-color-4-color\">Prozessuale Cyber Security<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-b4095a9\" id=\"konformitat-mit-dem-cyber-resilience-act\" data-block-id=\"b4095a9\"><style>.stk-b4095a9 {margin-bottom:8px !important;}.stk-b4095a9 .stk-block-heading__text{line-height:1.5em !important;font-weight:800 !important;}@media screen and (max-width:999px){.stk-b4095a9 .stk-block-heading__text{font-size:30px !important;}}@media screen and (max-width:689px){.stk-b4095a9 .stk-block-heading__text{font-size:25px !important;}}<\/style><h2 class=\"stk-block-heading__text\">Konformit&#xE4;t mit dem Cyber Resilience Act<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-587b688\" data-block-id=\"587b688\"><style>.stk-587b688 {margin-bottom:34px !important;}<\/style><p class=\"stk-block-text__text\">Kundenindividuelle L&#xF6;sungen f&#xFC;r Embedded Cyber Security&#xA0;werden in einem prozessualen Rahmen entwickelt und erf&#xFC;llen alle regulatorischen Anforderungen. Durch ein strukturiertes Vorgehen stellen wir sicher, dass unsere L&#xF6;sungen nicht nur technisch, sondern auch normativ konform sind. Unsere vielschichtige Sicherheitsstrategie deckt alle Aspekte der Cyber Security ab und sorgt daf&#xFC;r, dass unsere Kunden stets einwandfrei gesicherte Embedded Systems erhalten.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list has-text-color stk-block stk-f581ebe\" data-block-id=\"f581ebe\"><style>.stk-f581ebe {--stk-icon-list-column-count:1 !important;--stk-icon-list-row-gap:12px !important;margin-bottom:17px !important;}.stk-f581ebe ul li, .stk-f581ebe ol li, .stk-f581ebe ul li span, .stk-f581ebe ol li span{color:var(--theme-palette-color-8, #0F7173) !important;font-weight:bold !important;}<\/style><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-f581ebe\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M470.6 278.6c12.5-12.5 12.5-32.8 0-45.3l-160-160c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3L402.7 256 265.4 393.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0l160-160zm-352 160l160-160c12.5-12.5 12.5-32.8 0-45.3l-160-160c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3L210.7 256 73.4 393.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0z\"><\/path><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-cb70cde\" data-block-id=\"cb70cde\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-f581ebe\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Erstellung von STRIDE-Analysen<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-b52d0a5\" data-block-id=\"b52d0a5\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-f581ebe\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Erstellung von Security-Konzepten<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-9cd7c35\" data-block-id=\"9cd7c35\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-f581ebe\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Regelm&#xE4;&#xDF;ige Schwachstellen-Scans<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-6031ee2\" data-block-id=\"6031ee2\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-f581ebe\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Sicherheits-Integrit&#xE4;tstests<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-406bd53\" data-block-id=\"406bd53\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-f581ebe\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Ma&#xDF;nahmen f&#xFC;r Build- und Delivery-Prozesse<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-6a919c4\" data-block-id=\"6a919c4\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-f581ebe\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Bereitstellung von Herstellerdokumentation f&#xFC;r UNECE R155\/R156<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-ffb4d08\" data-block-id=\"ffb4d08\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-f581ebe\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">CRA-Konformit&#xE4;tserkl&#xE4;rungen<\/span><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-40b0790\" data-v=\"4\" data-block-id=\"40b0790\"><style>.stk-40b0790-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-40b0790-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center-mobile stk-block-content stk-inner-blocks stk-40b0790-inner-blocks\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/02\/cyber-security-embedded-prozess.svg\" alt=\"\" class=\"wp-image-967\"\/><\/figure>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-2c914b0\" data-block-id=\"2c914b0\"><style>.stk-2c914b0 {height:151px !important;}<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Embedded Systems Cyber Security ist f\u00fcr die zuverl\u00e4ssigen Betrieb in Zeiten hybrider Bedrohungen von High-Tech-Elektronik entscheidend. In sicherheitskritischen Bereichen m\u00fcssen elektronische Systeme vor Angriffen von Hackern und Black Hats gesch\u00fctzt werden. Eine vorausschauende und strukturelle Herangehensweise, die Risiken und Angriffvektoren strategisch analysiert, ist daher unverzichtbar. Embedded Cyber Security&nbsp; Gefahren f\u00fcr Elektronik erkennen und [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-954","page","type-page","status-publish","hentry"],"blocksy_meta":{"has_hero_section":"disabled","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/pages\/954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/comments?post=954"}],"version-history":[{"count":12,"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/pages\/954\/revisions"}],"predecessor-version":[{"id":1714,"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/pages\/954\/revisions\/1714"}],"wp:attachment":[{"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/media?parent=954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}