{"id":182,"date":"2024-04-16T09:50:49","date_gmt":"2024-04-16T07:50:49","guid":{"rendered":"https:\/\/cyber.ddev.site\/wp\/focal-points\/key-technologies\/"},"modified":"2026-04-20T11:05:40","modified_gmt":"2026-04-20T09:05:40","slug":"schluesseltechnologien","status":"publish","type":"page","link":"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/","title":{"rendered":"Key technologies"},"content":{"rendered":"\n<p class=\"has-text-align-center is-style-subtitle-hight-space\">In the next ten to 15 years, new key technologies will fundamentally change cyber security. How well we master these technologies and protect them with our own patents is crucial for Germany&#8217;s technological sovereignty. That is why we are researching disruptive innovations such as new cryptographic processes, quantum technologies, advanced artificial intelligence and unmanned systems.  <\/p>\n<div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default ce-frame--with-icon has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__content__wrapper\">\n          <div class=\"ce-frame__icon ce-frame__icon--mobile\">\n        \n    <\/div>\n      \n      <div class=\"ce-frame__content__row\">\n              <div class=\"ce-frame__icon\">\n        \n    <\/div>\n          <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Our topics in this focus area<\/h2>\n\n\n  <div class=\"ce-faqaccordions wp-block-cyberagentur-faqaccordions accordion\" id=\"69f3766493ec4\">\n  <div class=\"accordion-item\" id=\"quantentechnologie\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f3766493ec4_5845\" aria-expanded=\"false\" aria-controls=\"69f3766493ec4_5845\">\n      <span>Quantum technology<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f3766493ec4_5845\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>The field of quantum technologies encompasses far more than just the development of quantum computers and will also shape areas such as high-precision sensor technology and particularly secure communication methods in the future. Among other things, we are researching mobile quantum computers, new attack and protection concepts for quantum computers and quantum-based sensor technology and its influence on security-relevant information. <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"cryptology\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f3766493ec4_3557\" aria-expanded=\"false\" aria-controls=\"69f3766493ec4_3557\">\n      <span>Cryptology<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f3766493ec4_3557\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>Cryptography is the basis for secure digital communication and indispensable for data protection, digital identities and trustworthy IT systems. Our focus is on the development of robust and future-proof cryptographic processes that effectively protect both individuals and state structures and reliably safeguard privacy against spying and manipulation right down to end device level. <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"kuenstliche-intelligenz\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f3766493ec4_5852\" aria-expanded=\"false\" aria-controls=\"69f3766493ec4_5852\">\n      <span>Artificial intelligence<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f3766493ec4_5852\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>Artificial intelligence is a key driver for the cyber security and technological sovereignty of the future. In view of short innovation cycles and increasing attack surfaces, our focus is on holistic security approaches for AI, the rapid and trustworthy use of powerful basic models and AI systems as well as fundamental research into algorithms, hardware and system architectures. <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"emergente-disruptive-technologien\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f3766493ec4_5701\" aria-expanded=\"false\" aria-controls=\"69f3766493ec4_5701\">\n      <span>Emerging disruptive technologies<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f3766493ec4_5701\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>In the field of security-relevant architectures, new and disruptive approaches are being researched that serve as catalysts for the further development of physical and digital protection systems. These include securing space-based systems against cyber attacks, the development of new types of physical data carriers for shielded and concealed spaces and the use of intelligent materials that reduce dependence on strategic raw materials. In addition, nature-inspired methods for sensor technology, detection and navigation are being investigated to enable new forms of situational awareness and positioning. In addition, the focus is on unconventional computer architectures based on innovative mathematical processes that open up new dimensions of information processing. The aim is to develop architectures and capabilities that can act resiliently, adaptively and predictively in complex fields of application.    <\/p>\n\n    <\/div>\n  <\/div>\n<\/div>\n  <\/div>\n<\/div>\n      <\/div>\n    <\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-panel-buttons is-layout-constrained alignfull ce-panel-buttons__columns-3 ce-panel-buttons--default has-background has-white-background-color align align is-style-less-space wp-block-cyberagentur-panelbuttons has-background has-white-background-color\">\n  <div class=\"ce-panel-buttons__content\">\n    <div class=\"acf-innerblocks-container\">\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/programs\/?category=36' target='_self' aria-label='go to  Programs'>  <h2 class=\"title\">Programs<\/h2>\n  <p>in this focus<\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/awarded\/?category=36' target='_self' aria-label='go to  Awards'>  <h2 class=\"title\">Awards<\/h2>\n  <p>in this focus<\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/karriere\/' target='_self' aria-label='go to  Vacancies'>  <h2 class=\"title\">Vacancies<\/h2>\n  <p><\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n<\/div>\n  <\/div>\n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-right ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-purple-misty-background-color align is-style-default wp-block-cyberagentur-frame has-background has-purple-misty-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__background\">\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/Fragezeichen_space_white.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\n    <\/div>    \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Questions about this focus?<\/h2>\n\n\n\n<p>Send us an e-mail: <br\/> schluesseltechnologien@cyberagentur.de<\/p>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left is-style-subtitle is-style-subheadline\">Also interesting<\/h2>\n\n\n<div class=\"ce-focusmenu ce-focusmenu--2columns has-background has-white-background-color align wp-block-cyberagentur-focusmenu has-background has-white-background-color\">\n    <ul class=\"ce-panelmenu\">\n        <li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/\" aria-label=\"go to  Secure society\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Gesellschaft.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Secure society<\/h3>\n      <p>So that we are safe in the digital world of the day after tomorrow.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/\" aria-label=\"go to  Cybersecurity of complex systems\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Systeme.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Cybersecurity of complex systems<\/h3>\n      <p>New security paradigms for complex digital orders.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/\" aria-label=\"go to  Trustworthy technical value chains\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2026\/04\/CA_Icon_VerTechWK_final.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Trustworthy technical value chains<\/h3>\n      <p>So that citizens in Germany can have confidence in digital solutions.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li>\n    <\/ul>\n<\/div>\n<\/div>\n    <\/div>\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p>In the next ten to 15 years, new key technologies will fundamentally change cyber security. How well we master these technologies and protect them with our own patents is crucial for Germany&#8217;s technological sovereignty. That is why we are researching disruptive innovations such as new cryptographic processes, quantum technologies, advanced artificial intelligence and unmanned systems.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":3321,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-182","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key technologies - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key technologies - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"In the next ten to 15 years, new key technologies will fundamentally change cyber security. How well we master these technologies and protect them with our own patents is crucial for Germany&#8217;s technological sovereignty. That is why we are researching disruptive innovations such as new cryptographic processes, quantum technologies, advanced artificial intelligence and unmanned systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T09:05:40+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/schluesseltechnologien\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/schluesseltechnologien\\\/\",\"name\":\"Key technologies - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2024-04-16T07:50:49+00:00\",\"dateModified\":\"2026-04-20T09:05:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/schluesseltechnologien\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/schluesseltechnologien\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/schluesseltechnologien\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Focal points\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Key technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key technologies - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/","og_locale":"en_GB","og_type":"article","og_title":"Key technologies - Cyberagentur","og_description":"In the next ten to 15 years, new key technologies will fundamentally change cyber security. How well we master these technologies and protect them with our own patents is crucial for Germany&#8217;s technological sovereignty. That is why we are researching disruptive innovations such as new cryptographic processes, quantum technologies, advanced artificial intelligence and unmanned systems.","og_url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/","og_site_name":"Cyberagentur","article_modified_time":"2026-04-20T09:05:40+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/","url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/","name":"Key technologies - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2024-04-16T07:50:49+00:00","dateModified":"2026-04-20T09:05:40+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Focal points","item":"https:\/\/www.cyberagentur.de\/en\/focal-points\/"},{"@type":"ListItem","position":3,"name":"Key technologies"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":11,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/182\/revisions"}],"predecessor-version":[{"id":7079,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/182\/revisions\/7079"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/3321"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}