{"id":4755,"date":"2024-04-02T09:54:22","date_gmt":"2024-04-02T07:54:22","guid":{"rendered":"https:\/\/www.cyberagentur.de\/example-page\/"},"modified":"2026-04-28T14:21:27","modified_gmt":"2026-04-28T12:21:27","slug":"example-page","status":"publish","type":"page","link":"https:\/\/www.cyberagentur.de\/en\/","title":{"rendered":"Home page"},"content":{"rendered":"<div class=\"ce-carousel ce-carousel--projectsteaser alignfull  has-background has-purple-misty-background-color align wp-block-cyberagentur-projectsteaser has-background has-purple-misty-background-color\" id=\"program\">\n    <div class='ce-carousel__content'>\n      <div class='ce-carousel__wrapper'>\n        <div class='ce-carousel__header'>\n          <h2 class='wp-block-heading has-text-align-center '>Programs<\/h2>\n          <p class='is-style-subtitle has-text-align-center'>Research for the day after tomorrow. <br \/>\r\nCommissioned by us \u2013 today.<\/p>\n        <\/div>\n          <div class=\"glide\" data-settings=\"{&quot;type&quot;:&quot;carousel&quot;,&quot;autoplay&quot;:false,&quot;gap&quot;:3,&quot;perView&quot;:3,&quot;hoverpause&quot;:true,&quot;bound&quot;:true,&quot;rewind&quot;:true,&quot;breakpoints&quot;:{&quot;1200&quot;:{&quot;perView&quot;:2},&quot;660&quot;:{&quot;perView&quot;:1}}}\">\n      <div data-glide-el=\"track\" class=\"glide__track\">\n          <div class=\"glide__slides\">\n              <div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/fis\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/FIS_2-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"FIS\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/FIS_2-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/FIS_2-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/FIS_2-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/FIS_2-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/FIS_2-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/FIS_2-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Secure Society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Forensics of Intelligent Systems (FIS)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/zck\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/ZCK-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"ZCK\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/ZCK-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/ZCK-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/ZCK-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/ZCK-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/ZCK-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/ZCK-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Secure Society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Future Cybercrime (ZCK)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/sck\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/SCK-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"SCK\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/SCK-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/SCK-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/SCK-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/SCK-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/SCK-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/SCK-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Secure Society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Harm Caused by Cybercrime (SCK)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/AuBi_2-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AuBi_2\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/AuBi_2-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/AuBi_2-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/AuBi_2-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/AuBi_2-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/AuBi_2-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/AuBi_2-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Secure Society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Digital authentication using new biometric methods (AuBi)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/aufo\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/AuFo-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AuFo\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/AuFo-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/AuFo-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/AuFo-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/AuFo-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/AuFo-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/AuFo-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Secure Society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Audio Forensics (AuFo)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/HSK-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"HSK\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/HSK-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/HSK-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/HSK-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/HSK-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/HSK-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/HSK-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Cybersicherheit komplexer Systeme<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Critical Infrastructure Protection (HSK)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/evit\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/Oevit-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Oevit\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/Oevit-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/Oevit-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/Oevit-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/Oevit-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/Oevit-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/Oevit-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Ecosystem Formally Verifiable IT \u2013 Provable Cybersecurity (EVIT)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/ara\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/ARA-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"ARA\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/ARA-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/ARA-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/ARA-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/ARA-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/ARA-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/ARA-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Cybersicherheit komplexer Systeme<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Alternative Computing Architectures (ARA)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/zander-f\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/ZANDER-F-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"ZANDER-F\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/ZANDER-F-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/ZANDER-F-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/ZANDER-F-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/ZANDER-F-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/ZANDER-F-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/ZANDER-F-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Cybersicherheit komplexer Systeme<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Future Alternative Messaging and Data Transmission in Difficult Conditions &#8211; Faraday&#8217;s Cage (ZANDER-F)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/ec2\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/EC-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"EC\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/EC-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/EC-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/EC-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/EC-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/EC-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/EC-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Encrypted Computing &#8211; Analysis &amp; Processing of Encrypted Data (EC2)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/RSML-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"RSML\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/RSML-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/RSML-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/RSML-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/RSML-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/RSML-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/RSML-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/mqc\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/MQC-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"MQC\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/MQC-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/MQC-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/MQC-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/MQC-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/MQC-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/MQC-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Mobile Quantum Computer &#8211; Quantum Processors for Mobile Use in Defense and Security Applications<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/fd\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/FD-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"FD\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/FD-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/FD-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/FD-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/FD-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/FD-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/FD-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Secure Society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Forensic Digital Copies (FD)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/bci\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/MMI_3-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/MMI_3-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/MMI_3-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/MMI_3-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/MMI_3-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/MMI_3-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/MMI_3-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Secure Society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Brain-Computer Interfaces (BCI): Safe Neural Human-Machine Interaction<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/hegemon\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/HEGEMON-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"HEGEMON\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/HEGEMON-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/HEGEMON-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/HEGEMON-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/HEGEMON-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/HEGEMON-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/HEGEMON-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Holistic Evaluation of Generative Foundation Models in a Security Context (HEGEMON)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/sca-qs\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/SCA-QS_2-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"SCA-QS_2\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/SCA-QS_2-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/SCA-QS_2-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/SCA-QS_2-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/SCA-QS_2-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/SCA-QS_2-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/SCA-QS_2-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Side-Channel Attacks with Quantum Sensing (SCA-QS)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/hal2025\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/08\/HAL25-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"HAL25\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/08\/HAL25-330x257.jpg 330w, \/wp-content\/uploads\/2024\/08\/HAL25-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/08\/HAL25-768x597.jpg 768w, \/wp-content\/uploads\/2024\/08\/HAL25-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/08\/HAL25-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/08\/HAL25-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Autonomous Intelligent Systems in a Swarm (HAL2025 ideas competition)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/sca4pqc\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2024\/11\/sca4pqc-330x257.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Image picture for the SCA4PQC program\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2024\/11\/sca4pqc-330x257.jpg 330w, \/wp-content\/uploads\/2024\/11\/sca4pqc-1024x796.jpg 1024w, \/wp-content\/uploads\/2024\/11\/sca4pqc-768x597.jpg 768w, \/wp-content\/uploads\/2024\/11\/sca4pqc-1536x1195.jpg 1536w, \/wp-content\/uploads\/2024\/11\/sca4pqc-2048x1593.jpg 2048w, \/wp-content\/uploads\/2024\/11\/sca4pqc-512x398.jpg 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Side-channel resistance in post-quantum cryptology (SCA4PQC)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/ddk\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Cybersicherheit komplexer Systeme<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Data reconstruction after targeted data reduction in difficult communication environments with a focus on image and sound (DDK)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/found-vr\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2023\/11\/FoUnD-VR-Image_freepik-330x257.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2023\/11\/FoUnD-VR-Image_freepik-330x257.png 330w, \/wp-content\/uploads\/2023\/11\/FoUnD-VR-Image_freepik-1024x796.png 1024w, \/wp-content\/uploads\/2023\/11\/FoUnD-VR-Image_freepik-768x597.png 768w, \/wp-content\/uploads\/2023\/11\/FoUnD-VR-Image_freepik-1536x1195.png 1536w, \/wp-content\/uploads\/2023\/11\/FoUnD-VR-Image_freepik-2048x1593.png 2048w, \/wp-content\/uploads\/2023\/11\/FoUnD-VR-Image_freepik-512x398.png 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Secure Society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Research platform for the investigation of disinformation in virtual reality (FoUnD-VR)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/3s\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"258\" src=\"\/wp-content\/uploads\/2026\/04\/Web_3S-330x258.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/04\/Web_3S-330x258.png 330w, \/wp-content\/uploads\/2026\/04\/Web_3S-1024x800.png 1024w, \/wp-content\/uploads\/2026\/04\/Web_3S-768x600.png 768w, \/wp-content\/uploads\/2026\/04\/Web_3S-512x400.png 512w, \/wp-content\/uploads\/2026\/04\/Web_3S.png 1280w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Software Security Score (3S)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/eloqa-pnt\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"258\" src=\"\/wp-content\/uploads\/2026\/04\/Web_EloKa-330x258.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/04\/Web_EloKa-330x258.png 330w, \/wp-content\/uploads\/2026\/04\/Web_EloKa-1024x800.png 1024w, \/wp-content\/uploads\/2026\/04\/Web_EloKa-768x600.png 768w, \/wp-content\/uploads\/2026\/04\/Web_EloKa-512x400.png 512w, \/wp-content\/uploads\/2026\/04\/Web_EloKa.png 1280w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Protective measures for quantum technology against future electronic warfare &#8211; position, navigation, timing (EloQa-PNT)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/moin-lamas\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"257\" src=\"\/wp-content\/uploads\/2026\/01\/MoIn-LaMAS-Image_freepik-330x257.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/01\/MoIn-LaMAS-Image_freepik-330x257.png 330w, \/wp-content\/uploads\/2026\/01\/MoIn-LaMAS-Image_freepik-1024x796.png 1024w, \/wp-content\/uploads\/2026\/01\/MoIn-LaMAS-Image_freepik-768x597.png 768w, \/wp-content\/uploads\/2026\/01\/MoIn-LaMAS-Image_freepik-1536x1195.png 1536w, \/wp-content\/uploads\/2026\/01\/MoIn-LaMAS-Image_freepik-2048x1593.png 2048w, \/wp-content\/uploads\/2026\/01\/MoIn-LaMAS-Image_freepik-512x398.png 512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Mobile Infrastructure: Situation Orientation for Mobile Autonomous Systems (MoIn-LaMAS)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/insurecs\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"258\" src=\"\/wp-content\/uploads\/2026\/04\/Web_InSuReCS-330x258.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/04\/Web_InSuReCS-330x258.png 330w, \/wp-content\/uploads\/2026\/04\/Web_InSuReCS-1024x800.png 1024w, \/wp-content\/uploads\/2026\/04\/Web_InSuReCS-768x600.png 768w, \/wp-content\/uploads\/2026\/04\/Web_InSuReCS-512x400.png 512w, \/wp-content\/uploads\/2026\/04\/Web_InSuReCS.png 1280w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Reconfigurable Intelligent Surfaces for Resilient Communication and Sensing (InSuReCS)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/iris\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"258\" src=\"\/wp-content\/uploads\/2026\/04\/Web_IRiS-330x258.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/04\/Web_IRiS-330x258.png 330w, \/wp-content\/uploads\/2026\/04\/Web_IRiS-1024x800.png 1024w, \/wp-content\/uploads\/2026\/04\/Web_IRiS-768x600.png 768w, \/wp-content\/uploads\/2026\/04\/Web_IRiS-512x400.png 512w, \/wp-content\/uploads\/2026\/04\/Web_IRiS.png 1280w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__category\">Key technologies<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Robust interaction of robotic systems in heterogeneous swarms for use in crisis and disaster situations (IRiS)<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div> \n          <\/div>\n      <\/div>\n          <div class=\"glide__controls\">\n      <div class=\"glide__arrows\" data-glide-el=\"controls\">\n          <button class=\"glide__arrow glide__arrow--left\" aria-label=\"Back\" data-glide-dir=\"&#60;\"><span class=\"glide__arrow--icon\"><\/span><\/button>\n      <\/div>\n      <div class=\"glide__arrows\" data-glide-el=\"controls\">\n          <button class=\"glide__arrow glide__arrow--right\" aria-label=\"Before\" data-glide-dir=\"&#62;\"><span class=\"glide__arrow--icon\"><\/span><\/button>\n      <\/div>\n    <\/div>      \n      \n  <\/div><div class='wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex '>\n  <div class='wp-block-button '>\n      <a class='wp-block-button__link wp-element-button' href='https:\/\/www.cyberagentur.de\/en\/programs\/'>View all programs<\/a>\n  <\/div>\n<\/div>\n      <\/div>\n    <\/div>  \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-white-background-color align is-style-default wp-block-cyberagentur-frame has-background has-white-background-color\" id=\"schwerpunkte\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-center\">Focal points<\/h2>\n\n\n\n<p class=\"has-text-align-center is-style-subtitle\">Safe society. Cybersecurity of complex systems. Key technologies. Trustworthy technical value chains.<\/p>\n\n\n\n<p class=\"has-text-align-center is-style-shrink\">Clustered into four focus areas, we have identified 14 cyber security topics within which we identify, fund and evaluate research projects.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-simple\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/\">Learn more<\/a><\/div>\n<\/div>\n\n\n<div class='ce-spacer'><\/div>\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-style-2columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"ce-imagebutton align align wp-block-cyberagentur-imagebutton\">\n    <a class='ce-imagebutton__link' href='https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/' target='_self' >    <div class=\"ce-imagebutton__image\" style=\"mask-image: url('\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Gesellschaft.svg');\"><\/div><span class='ce-imagebutton__label'>Secure society<\/span><\/a>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"ce-imagebutton align align wp-block-cyberagentur-imagebutton\">\n    <a class='ce-imagebutton__link' href='https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/' target='_self' >    <div class=\"ce-imagebutton__image\" style=\"mask-image: url('\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Systeme.svg');\"><\/div><span class='ce-imagebutton__label'>Cybersecurity of complex systems<\/span><\/a>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"ce-imagebutton align align wp-block-cyberagentur-imagebutton\">\n    <a class='ce-imagebutton__link' href='https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/' target='_self' >    <div class=\"ce-imagebutton__image\" style=\"mask-image: url('\/wp-content\/uploads\/2024\/04\/CA_Icon_Schluesseltechnologien-2.svg');\"><\/div><span class='ce-imagebutton__label'>Key technologies<\/span><\/a>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"ce-imagebutton align align wp-block-cyberagentur-imagebutton\">\n    <a class='ce-imagebutton__link' href='https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/' target='_self' >    <div class=\"ce-imagebutton__image\" style=\"mask-image: url('\/wp-content\/uploads\/2026\/04\/CA_Icon_VerTechWK_final.svg');\"><\/div><span class='ce-imagebutton__label'>Trustworthy technical value chains<\/span><\/a>\n<\/div><\/div>\n<\/div>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce--dark-mode ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default align wp-block-cyberagentur-frame\" id=\"innovations-und-wissensmanagement\">\n        <div class=\"ce-frame__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2512\" height=\"1599\" src=\"\/wp-content\/uploads\/2024\/07\/mesh_9.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/07\/mesh_9.jpg 2512w, \/wp-content\/uploads\/2024\/07\/mesh_9-330x210.jpg 330w, \/wp-content\/uploads\/2024\/07\/mesh_9-1024x652.jpg 1024w, \/wp-content\/uploads\/2024\/07\/mesh_9-768x489.jpg 768w, \/wp-content\/uploads\/2024\/07\/mesh_9-1536x978.jpg 1536w, \/wp-content\/uploads\/2024\/07\/mesh_9-2048x1304.jpg 2048w, \/wp-content\/uploads\/2024\/07\/mesh_9-512x326.jpg 512w\" sizes=\"auto, (max-width: 2512px) 100vw, 2512px\" \/>\n    <\/div>\n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-center\">Innovation &amp;<br\/>Knowledge management<\/h2>\n\n\n\n<p class=\"has-text-align-center is-style-subtitle\">A look into the future.<\/p>\n\n\n\n<p class=\"has-text-align-center is-style-shrink\">What could be top class in cyber security in ten to 15 years&#8217; time? Our innovation and knowledge management finds answers \u2013 by focusing on weak signals.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/schwerpunkte\/innovations-und-wissensmanagement\/\">Learn more<\/a><\/div>\n<\/div>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\" id=\"vergaben\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/04\/CA_Icon_Neu-4.svg\" alt=\"\" class=\"wp-image-231\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">New awards<\/h2>\n\n\n\n<p class=\"has-text-align-center is-style-subtitle\">Your research in cyber security &#8211; apply now.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-simple\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/awarded\/\">View new awards<\/a><\/div>\n<\/div>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-purple-pale-background-color align wp-block-cyberagentur-frame has-background has-purple-pale-background-color\" id=\"zahlen-fakten\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Facts &amp; Figures<\/h2>\n\n\n<div class=\"ce-factsandfigures align align wp-block-cyberagentur-factsandfigures\">\n    <div class=\"ce-factsandfigures__item\">\n    <span class=\"ce-factsandfigures__value\">80<\/span>\n    <span class=\"ce-factsandfigures__description\">Millions of euros for research programs per year<\/span>\n<\/div><div class=\"ce-factsandfigures__item\">\n    <span class=\"ce-factsandfigures__value\">14<\/span>\n    <span class=\"ce-factsandfigures__description\">Research programs awarded since foundation<\/span>\n<\/div><div class=\"ce-factsandfigures__item\">\n    <span class=\"ce-factsandfigures__value\">114<\/span>\n    <span class=\"ce-factsandfigures__description\">Employees (incl. trainees)<\/span>\n<\/div><div class=\"ce-factsandfigures__item\">\n    <span class=\"ce-factsandfigures__value\">4\u20135<\/span>\n    <span class=\"ce-factsandfigures__description\">Years average duration per research program<\/span>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/cyberagentur\/about-us\/\">About us<\/a><\/div>\n<\/div>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-carousel ce-carousel--newsteaser alignfull  has-background has-purple-misty-background-color align wp-block-cyberagentur-newsteaser has-background has-purple-misty-background-color\" id=\"news\">\n    <div class='ce-carousel__content'>\n      <div class='ce-carousel__wrapper'>\n        <div class='ce-carousel__header'>\n          <h2 class='wp-block-heading has-text-align-center '>Latest news<\/h2>\n          <p class='is-style-subtitle has-text-align-center'>The latest from the Cyberagentur \u2013 for the world.<\/p>\n        <\/div>\n          <div class=\"glide\" data-settings=\"{&quot;type&quot;:&quot;slider&quot;,&quot;autoplay&quot;:false,&quot;gap&quot;:3,&quot;perView&quot;:3,&quot;hoverpause&quot;:true,&quot;bound&quot;:true,&quot;rewind&quot;:false,&quot;breakpoints&quot;:{&quot;1200&quot;:{&quot;perView&quot;:2},&quot;660&quot;:{&quot;perView&quot;:1}}}\">\n      <div data-glide-el=\"track\" class=\"glide__track\">\n          <div class=\"glide__slides\">\n              <div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"218\" src=\"\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-330x218.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"With 3S, the Cyberagentur wants to make software security comprehensible, measurable and comparable for end users - beyond mere seals and certificates.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-330x218.png 330w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-1024x677.png 1024w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-768x508.png 768w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-1536x1016.png 1536w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-512x339.png 512w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn.png 1920w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">04. May 2026<\/div>\n          <div class=\"card-item__excerpt\">Trustworthy technical value chains<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">No more blind faith in software<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/desinformation-in-der-zukunft\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"218\" src=\"\/wp-content\/uploads\/2026\/04\/20260429-SM-FoUnD-VR-LinkedIn-330x218.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"With FoUnD-VR, the Cyberagentur announced a research program to systematically investigate disinformation in immersive virtual spaces. The focus is on new forms of manipulation in XR environments and their significance for the cyber security of the future.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/04\/20260429-SM-FoUnD-VR-LinkedIn-330x218.png 330w, \/wp-content\/uploads\/2026\/04\/20260429-SM-FoUnD-VR-LinkedIn-1024x677.png 1024w, \/wp-content\/uploads\/2026\/04\/20260429-SM-FoUnD-VR-LinkedIn-768x508.png 768w, \/wp-content\/uploads\/2026\/04\/20260429-SM-FoUnD-VR-LinkedIn-1536x1016.png 1536w, \/wp-content\/uploads\/2026\/04\/20260429-SM-FoUnD-VR-LinkedIn-512x339.png 512w, \/wp-content\/uploads\/2026\/04\/20260429-SM-FoUnD-VR-LinkedIn.png 1920w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">30. April 2026<\/div>\n          <div class=\"card-item__excerpt\">Secure society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Disinformation in the future<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/von-hal2025-zu-iris-ideenwettbewerb-wird-zum-forschungsprogramm\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"218\" src=\"\/wp-content\/uploads\/2026\/04\/20260428-SM-IRiS-LinkedIn-330x218.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"HAL2025 becomes IRiS: The Cyberagentur transforms the ideas competition &quot;Autonomous intelligent systems in swarms&quot; into a research program for robust robotic swarms in crisis and disaster situations.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/04\/20260428-SM-IRiS-LinkedIn-330x218.png 330w, \/wp-content\/uploads\/2026\/04\/20260428-SM-IRiS-LinkedIn-1024x677.png 1024w, \/wp-content\/uploads\/2026\/04\/20260428-SM-IRiS-LinkedIn-768x508.png 768w, \/wp-content\/uploads\/2026\/04\/20260428-SM-IRiS-LinkedIn-1536x1016.png 1536w, \/wp-content\/uploads\/2026\/04\/20260428-SM-IRiS-LinkedIn-512x339.png 512w, \/wp-content\/uploads\/2026\/04\/20260428-SM-IRiS-LinkedIn.png 1920w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">30. April 2026<\/div>\n          <div class=\"card-item__excerpt\">Key technology<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">HAL2025 becomes IRiS &#8211; ideas competition becomes research program<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/resilienz-fuer-die-kryptographie-von-morgen\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"218\" src=\"\/wp-content\/uploads\/2026\/04\/20260428-SM-SCA4PQC-LinkedIn-englisch-330x218.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"With the third research project in the SCA4PQC program, Cyberagentur strengthens post-quantum cryptography against real-world side-channel and fault-injection attacks.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/04\/20260428-SM-SCA4PQC-LinkedIn-englisch-330x218.png 330w, \/wp-content\/uploads\/2026\/04\/20260428-SM-SCA4PQC-LinkedIn-englisch-1024x677.png 1024w, \/wp-content\/uploads\/2026\/04\/20260428-SM-SCA4PQC-LinkedIn-englisch-768x508.png 768w, \/wp-content\/uploads\/2026\/04\/20260428-SM-SCA4PQC-LinkedIn-englisch-1536x1016.png 1536w, \/wp-content\/uploads\/2026\/04\/20260428-SM-SCA4PQC-LinkedIn-englisch-512x339.png 512w, \/wp-content\/uploads\/2026\/04\/20260428-SM-SCA4PQC-LinkedIn-englisch.png 1920w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">28. April 2026<\/div>\n          <div class=\"card-item__excerpt\">Key technology<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Resilience for the cryptography of tomorrow<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/wenn-der-bund-fiktion-schreibt-um-fakten-zu-erklaeren\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"220\" src=\"\/wp-content\/uploads\/2026\/04\/20260323-SM-Kryptokalypse-LinkedIn-1-330x220.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Jens H\u00fcttenberger talks about the novel &quot;Cryptocalypse&quot; and the ambivalences of quantum computing between progress, risk and social explosiveness in the podcast &quot;Hitchhiking through cyberspace&quot;.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/04\/20260323-SM-Kryptokalypse-LinkedIn-1-330x220.png 330w, \/wp-content\/uploads\/2026\/04\/20260323-SM-Kryptokalypse-LinkedIn-1-1024x683.png 1024w, \/wp-content\/uploads\/2026\/04\/20260323-SM-Kryptokalypse-LinkedIn-1-768x512.png 768w, \/wp-content\/uploads\/2026\/04\/20260323-SM-Kryptokalypse-LinkedIn-1-512x341.png 512w, \/wp-content\/uploads\/2026\/04\/20260323-SM-Kryptokalypse-LinkedIn-1.png 1500w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">08. April 2026<\/div>\n          <div class=\"card-item__excerpt\">Cyberagentur<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">When the federal government writes fiction to explain facts<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/ddk-verlaessliche-bild-und-tonuebertragung-trotz-minimalbandbreite\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"218\" src=\"\/wp-content\/uploads\/2026\/03\/20260316_SM_Zitat_Marcus-Hillmann-330x218.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Dr. Marcus Hillmann erl\u00e4utert zur Ausschreibung des Forschungsprogramms DDK die Bedeutung verl\u00e4sslicher Kommunikation in schwierigen Umgebungen.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/03\/20260316_SM_Zitat_Marcus-Hillmann-330x218.png 330w, \/wp-content\/uploads\/2026\/03\/20260316_SM_Zitat_Marcus-Hillmann-1024x677.png 1024w, \/wp-content\/uploads\/2026\/03\/20260316_SM_Zitat_Marcus-Hillmann-768x508.png 768w, \/wp-content\/uploads\/2026\/03\/20260316_SM_Zitat_Marcus-Hillmann-1536x1016.png 1536w, \/wp-content\/uploads\/2026\/03\/20260316_SM_Zitat_Marcus-Hillmann-512x339.png 512w, \/wp-content\/uploads\/2026\/03\/20260316_SM_Zitat_Marcus-Hillmann.png 1920w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">19. March 2026<\/div>\n          <div class=\"card-item__excerpt\">Secure systems<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">DDK: Reliable image and sound transmission despite minimal bandwidth<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/unsichtbar-kommunizieren\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"220\" src=\"\/wp-content\/uploads\/2026\/03\/20260316_SM_InSuReCS_StD-330x220.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Die Cyberagentur l\u00e4dt zum virtuellen Partnering-Event des Forschungsprogramms InSuReCS ein, um potenzielle Partner f\u00fcr neue Kommunikationsl\u00f6sungen zu vernetzen.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/03\/20260316_SM_InSuReCS_StD-330x220.png 330w, \/wp-content\/uploads\/2026\/03\/20260316_SM_InSuReCS_StD-1024x683.png 1024w, \/wp-content\/uploads\/2026\/03\/20260316_SM_InSuReCS_StD-768x512.png 768w, \/wp-content\/uploads\/2026\/03\/20260316_SM_InSuReCS_StD-512x341.png 512w, \/wp-content\/uploads\/2026\/03\/20260316_SM_InSuReCS_StD.png 1500w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">18. March 2026<\/div>\n          <div class=\"card-item__excerpt\">Trustworthy technical value chains<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Communicate invisibly<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/cyberagentur-begruesst-eckpunktepapier-und-dringt-auf-klare-rollen-und-schnellen-transfer\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"220\" src=\"\/wp-content\/uploads\/2026\/03\/20260311_SM_BMFTR-330x220.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"BMFTR publishes key issues paper &quot;Cybersecurity - Research Policy Impulses&quot; and explicitly mentions the Cyberagentur. The agency welcomes the impetus and focuses on clear roles and effective transfer.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/03\/20260311_SM_BMFTR-330x220.png 330w, \/wp-content\/uploads\/2026\/03\/20260311_SM_BMFTR-1024x683.png 1024w, \/wp-content\/uploads\/2026\/03\/20260311_SM_BMFTR-768x512.png 768w, \/wp-content\/uploads\/2026\/03\/20260311_SM_BMFTR-512x341.png 512w, \/wp-content\/uploads\/2026\/03\/20260311_SM_BMFTR.png 1500w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">13. March 2026<\/div>\n          <div class=\"card-item__excerpt\">Politics<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Cyberagentur welcomes key issues paper and urges clear roles and rapid transfer<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"218\" src=\"\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-330x218.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Expression of interest for Ne-Trust launched: New \u201cnegative trust\u201d approaches are intended to make IT systems more effective against insider and AI-supported attacks.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-330x218.png 330w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-1024x677.png 1024w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-768x508.png 768w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-1536x1016.png 1536w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-512x339.png 512w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png 1920w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">24. February 2026<\/div>\n          <div class=\"card-item__excerpt\">Secure systems<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">Towards a new cybersecurity paradigm<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/wenn-audiodaten-mehr-verraten-als-worte\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"218\" src=\"\/wp-content\/uploads\/2026\/02\/SM-POST-Zitate-Olivia-en-330x218.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Olivia Gr\u00e4upner, Research Officer Secure Society, on high-risk research within the Audio Forensics (AuFo) programme.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/02\/SM-POST-Zitate-Olivia-en-330x218.png 330w, \/wp-content\/uploads\/2026\/02\/SM-POST-Zitate-Olivia-en-1024x677.png 1024w, \/wp-content\/uploads\/2026\/02\/SM-POST-Zitate-Olivia-en-768x508.png 768w, \/wp-content\/uploads\/2026\/02\/SM-POST-Zitate-Olivia-en-512x339.png 512w, \/wp-content\/uploads\/2026\/02\/SM-POST-Zitate-Olivia-en.png 1512w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">19. February 2026<\/div>\n          <div class=\"card-item__excerpt\">Secure society<\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">When audio data reveals more than words<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"card-item\" itemscope itemtype=\"https:\/\/schema.org\/NewsArticle\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/efi-gutachten-empfiehlt-cyberagentur-agiler-handlungsfaehig-zu-machen\/\" itemprop=\"url\">\n        <div class=\"card-item__image glide-button-position-ref\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"220\" src=\"\/wp-content\/uploads\/2026\/02\/20260213-PM-SM-EFI-Gutachten-330x220.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"EFI Report 2026 strengthens the course: The expert commission is in favor of making the Cyberagentur more agile - as an impulse for more speed in cybersecurity research.\" itemprop=\"image\" srcset=\"\/wp-content\/uploads\/2026\/02\/20260213-PM-SM-EFI-Gutachten-330x220.png 330w, \/wp-content\/uploads\/2026\/02\/20260213-PM-SM-EFI-Gutachten-1024x683.png 1024w, \/wp-content\/uploads\/2026\/02\/20260213-PM-SM-EFI-Gutachten-768x512.png 768w, \/wp-content\/uploads\/2026\/02\/20260213-PM-SM-EFI-Gutachten-512x341.png 512w, \/wp-content\/uploads\/2026\/02\/20260213-PM-SM-EFI-Gutachten.png 1500w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/div>\n        <div class=\"card-item__body\">\n          <div class=\"card-item__date-published\" itemprop=\"datePublished\">13. February 2026<\/div>\n          <div class=\"card-item__excerpt\"><\/div>\n          <h3 class=\"card-item__headline\" itemprop=\"headline\">EFI report recommends: Making Cyberagentur more agile and capable of acting<\/h3>\n          <div class=\"wp-block-button is-style-simple\"><span class=\"wp-block-button__link wp-element-button\" >Learn more<\/span><\/div>    \n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div> \n          <\/div>\n      <\/div>\n          <div class=\"glide__controls\">\n      <div class=\"glide__arrows\" data-glide-el=\"controls\">\n          <button class=\"glide__arrow glide__arrow--left\" aria-label=\"Back\" data-glide-dir=\"&#60;\"><span class=\"glide__arrow--icon\"><\/span><\/button>\n      <\/div>\n      <div class=\"glide__arrows\" data-glide-el=\"controls\">\n          <button class=\"glide__arrow glide__arrow--right\" aria-label=\"Before\" data-glide-dir=\"&#62;\"><span class=\"glide__arrow--icon\"><\/span><\/button>\n      <\/div>\n    <\/div>      \n      \n  <\/div><div class='wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex '>\n  <div class='wp-block-button '>\n      <a class='wp-block-button__link wp-element-button' href='https:\/\/www.cyberagentur.de\/en\/press\/'>All press articles<\/a>\n  <\/div>\n<\/div>\n      <\/div>\n    <\/div>  \n<\/div><div class=\"ce-carousel ce-carousel--faq alignfull  has-background has-white-background-color align wp-block-cyberagentur-faqteaser has-background has-white-background-color\" id=\"faq\">\n    <div class='ce-carousel__content'>\n      <div class='ce-carousel__wrapper'>\n        <div class='ce-carousel__header'>\n          <h2 class='wp-block-heading has-text-align-left '>FAQ<\/h2>\n          <p class='is-style-subtitle has-text-align-left'>Questions that we are frequently asked:<\/p>\n        <\/div>\n          <div class=\"glide\" data-settings=\"{&quot;type&quot;:&quot;slider&quot;,&quot;autoplay&quot;:false,&quot;gap&quot;:3,&quot;perView&quot;:1,&quot;hoverpause&quot;:true,&quot;bound&quot;:true,&quot;rewind&quot;:true,&quot;breakpoints&quot;:[]}\">\n      <div data-glide-el=\"track\" class=\"glide__track\">\n          <div class=\"glide__slides\">\n              <div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"faq-item\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/faq\/#what-does-the-cyberagentur-do\" itemprop=\"url\">\n        <div class=\"faq-item__body glide-button-position-ref\">\n          <h3 class=\"faq-item__headline\" itemprop=\"headline\">What does the Cyberagentur do?<\/h3>\n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"faq-item\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/faq\/#research-the-cyberagentur\" itemprop=\"url\">\n        <div class=\"faq-item__body glide-button-position-ref\">\n          <h3 class=\"faq-item__headline\" itemprop=\"headline\">Is the Cyberagentur doing research?<\/h3>\n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"faq-item\">\n      <a class=\"\" href=\"https:\/\/www.cyberagentur.de\/en\/faq\/#arbeiten-bei-der-cyberagentur-nur-it-spezialistinnen\" itemprop=\"url\">\n        <div class=\"faq-item__body glide-button-position-ref\">\n          <h3 class=\"faq-item__headline\" itemprop=\"headline\">Do only IT specialists work at the Cyberagentur?<\/h3>\n        <\/div>\n      <\/a>\n    <\/section>\n  <\/div>\n<\/div> \n          <\/div>\n      <\/div>\n          <div class=\"glide__controls\">\n      <div class=\"glide__arrows\" data-glide-el=\"controls\">\n          <button class=\"glide__arrow glide__arrow--left\" aria-label=\"Back\" data-glide-dir=\"&#60;\"><span class=\"glide__arrow--icon\"><\/span><\/button>\n      <\/div>\n      <div class=\"glide__arrows\" data-glide-el=\"controls\">\n          <button class=\"glide__arrow glide__arrow--right\" aria-label=\"Before\" data-glide-dir=\"&#62;\"><span class=\"glide__arrow--icon\"><\/span><\/button>\n      <\/div>\n    <\/div>      \n        <div class='glide__bullets' data-glide-el='controls[nav]'>\n    <button class='glide__bullet' aria-label='Go to the 1. Entry' data-glide-dir='=0'><\/button><button class='glide__bullet' aria-label='Go to the 2. Entry' data-glide-dir='=1'><\/button><button class='glide__bullet' aria-label='Go to the 3. Entry' data-glide-dir='=2'><\/button>\n  <\/div>\n  <\/div><div class='wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-left '>\n  <div class='wp-block-button is-style-simple'>\n      <a class='wp-block-button__link wp-element-button' href='https:\/\/www.cyberagentur.de\/en\/faq\/'>All questions &amp; answers<\/a>\n  <\/div>\n<\/div>\n      <\/div>\n    <\/div>  \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce--dark-mode ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default align hide-on-print wp-block-cyberagentur-frame\" id=\"newsletter\">\n        <div class=\"ce-frame__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"\/wp-content\/uploads\/2024\/04\/abstract-plexus-geometrical-shapes-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/abstract-plexus-geometrical-shapes-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/abstract-plexus-geometrical-shapes-300x169.jpg 300w, \/wp-content\/uploads\/2024\/04\/abstract-plexus-geometrical-shapes-1024x576.jpg 1024w, \/wp-content\/uploads\/2024\/04\/abstract-plexus-geometrical-shapes-768x432.jpg 768w, \/wp-content\/uploads\/2024\/04\/abstract-plexus-geometrical-shapes-1536x864.jpg 1536w, \/wp-content\/uploads\/2024\/04\/abstract-plexus-geometrical-shapes-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Newsletter<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"is-style-subtitle\">Your update on research, awarding and co.<\/p>\n\n\n\n<p>Subscribe to our scientific newsletter.\nThis will keep you up to date on which research projects we are currently awarding, when partnering events, symposia or ideas competitions are coming up and what&#8217;s new in research. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"ce-scwrapper align align wp-block-cyberagentur-shortcodewrapper\">\n  \n\t\t\t<form id=\"sib_signup_form_2\" method=\"post\" class=\"sib_signup_form\">\n\t\t\t\t<div class=\"sib_loader\" style=\"display:none;\"><img\n\t\t\t\t\t\t\tsrc=\"https:\/\/www.cyberagentur.de\/wp-includes\/images\/spinner.gif\" alt=\"loader\"><\/div>\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_action\" value=\"subscribe_form_submit\">\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_id\" value=\"2\">\n                <input type=\"hidden\" name=\"sib_form_alert_notice\" value=\"Please fill out this field\">\n                <input type=\"hidden\" name=\"sib_form_invalid_email_notice\" value=\"Your email address is invalid\">\n                <input type=\"hidden\" name=\"sib_security\" value=\"133d801f97\">\n\t\t\t\t<div class=\"sib_signup_box_inside_2\">\n\t\t\t\t\t<div style=\"\/*display:none*\/\" class=\"sib_msg_disp\">\n\t\t\t\t\t<\/div>\n                    \t\t\t\t\t<div class=\"ce-newsletter-form\">\r\n    <p class=\"sib-email-area\">\r\n        <label>\r\n            <span>E-mail address*<\/span>\r\n            <input type=\"email\" class=\"sib-email-area\" placeholder=\"E-mail address*\" name=\"email\" required=\"required\">\r\n        <\/label>\r\n    <\/p>\r\n    <p class=\"sib-FIRSTNAME-area\">\r\n        <label>\r\n            <span>First name<\/span>\r\n            <input type=\"text\" class=\"sib-FIRSTNAME-area\" placeholder=\"First name\" name=\"FIRSTNAME\">\r\n        <\/label>\r\n    <\/p>\r\n    <p class=\"sib-LASTNAME-area\">\r\n        <label>\r\n            <span>Surname<\/span>\r\n            <input type=\"text\" class=\"sib-NAME-area\" placeholder=\"Surname\" name=\"LASTNAME\">\r\n        <\/label>\r\n    <\/p>\r\n    <div class=\"form-radio-wrapper\">\r\n        <input type=\"checkbox\" name=\"terms\" required=\"required\" id=\"newsletter-terms\">\r\n        <label for=\"newsletter-terms\">\r\n            <span class=\"label-text\">I agree to the terms and conditions set out in the <a href=\"https:\/\/www.cyberagentur.de\/en\/privacy-policy\/\">privacy policy<\/a>\r\n                are. (Required field)<\/span>\r\n        <\/label>\r\n    <\/div>\r\n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex\">\r\n        <div class=\"wp-block-button\">\r\n            <button type=\"submit\" class=\"sib-default-btn wp-block-button__link wp-element-button\">Subscribe to our newsletter<\/button>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t<\/form>\n\t\t\t<style>\n\t\t\t\tform#sib_signup_form_2 p.sib-alert-message {\n    padding: 6px 12px;\n    margin-bottom: 20px;\n    border: 1px solid transparent;\n    border-radius: 4px;\n    -webkit-box-sizing: border-box;\n    -moz-box-sizing: border-box;\n    box-sizing: border-box;\n}\nform#sib_signup_form_2 p.sib-alert-message-error {\n    background-color: #f2dede;\n    border-color: #ebccd1;\n    color: #a94442;\n}\nform#sib_signup_form_2 p.sib-alert-message-success {\n    background-color: #dff0d8;\n    border-color: #d6e9c6;\n    color: #3c763d;\n}\nform#sib_signup_form_2 p.sib-alert-message-warning {\n    background-color: #fcf8e3;\n    border-color: #faebcc;\n    color: #8a6d3b;\n}\n\t\t\t<\/style>\n\t\t\t\n<\/div><\/div>\n<\/div>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-carousel ce-carousel--insight-default alignfull ce-carousel--default has-background has-purple-misty-background-color align wp-block-cyberagentur-insights has-background has-purple-misty-background-color\" id=\"insights\">\n    <div class='ce-carousel__content'>\n      <div class='ce-carousel__wrapper'>\n        <div class='ce-carousel__header'>\n          <h2 class='wp-block-heading has-text-align-left '>Insights<\/h2>\n          <p class='is-style-subtitle has-text-align-left'>On our own behalf.<\/p>\n        <\/div>\n          <div class=\"glide\" data-settings=\"{&quot;type&quot;:&quot;slider&quot;,&quot;autoplay&quot;:false,&quot;gap&quot;:3,&quot;perView&quot;:1,&quot;hoverpause&quot;:true,&quot;bound&quot;:true,&quot;rewind&quot;:true,&quot;breakpoints&quot;:[]}\">\n      <div data-glide-el=\"track\" class=\"glide__track\">\n          <div class=\"glide__slides\">\n              <div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"insight-item\">\n        \n        <div class=\"insight-item__body\">\n          <blockquote class=\"insight-item__blockquote glide-button-position-ref\" >At the cyber agency, I have the opportunity to turn science fiction into reality.<\/blockquote>\n          <div class=\"insight-item__meta\">\n            <div class=\"insight-item__name\">Kristin Biegner<\/div>\n            <div class=\"insight-item__position\">Research Officer Secure Society<\/div>\n          <\/div>\n        <\/div>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"insight-item\">\n            <div class=\"insight-item__image\">\n        <div class=\"insight-item__image__virtual\" style=\"background-image: url('\/wp-content\/uploads\/2024\/11\/Julian_10.png');\"><\/div>\n    <\/div>\n        <div class=\"insight-item__body\">\n          <blockquote class=\"insight-item__blockquote glide-button-position-ref\" >By involving security authorities and the armed forces in our research projects at an early stage, we ensure that innovative solutions are applied exactly where they are needed.\n<\/blockquote>\n          <div class=\"insight-item__meta\">\n            <div class=\"insight-item__name\">Dr. Julian Laufs<\/div>\n            <div class=\"insight-item__position\">Head of Partner and Knowledge Management<\/div>\n          <\/div>\n        <\/div>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"insight-item\">\n        \n        <div class=\"insight-item__body\">\n          <blockquote class=\"insight-item__blockquote glide-button-position-ref\" >We have a unique opportunity here not only to significantly promote and advance BCI research, but also to help shape innovative technologies that could revolutionize the understanding and application of brain-computer interfaces.<\/blockquote>\n          <div class=\"insight-item__meta\">\n            <div class=\"insight-item__name\">Dr. Paula Vieweg<\/div>\n            <div class=\"insight-item__position\">Head of Human-Machine Interaction<\/div>\n          <\/div>\n        <\/div>\n    <\/section>\n  <\/div>\n<\/div><div class=\"glide__slide\">\n  <div class=\"glide__card-wrapper\">\n    <section class=\"insight-item\">\n            <div class=\"insight-item__image\">\n        <div class=\"insight-item__image__virtual\" style=\"background-image: url('\/wp-content\/uploads\/2024\/11\/Olivia_10.png');\"><\/div>\n    <\/div>\n        <div class=\"insight-item__body\">\n          <blockquote class=\"insight-item__blockquote glide-button-position-ref\" >I find the question of how cybercrime can be recognized and combated in order to effectively protect society and the state against cyberattacks particularly exciting.<\/blockquote>\n          <div class=\"insight-item__meta\">\n            <div class=\"insight-item__name\">Olivia Gr\u00e4upner<\/div>\n            <div class=\"insight-item__position\">Research Officer Secure Society<\/div>\n          <\/div>\n        <\/div>\n    <\/section>\n  <\/div>\n<\/div> \n          <\/div>\n      <\/div>\n          <div class=\"glide__controls\">\n      <div class=\"glide__arrows\" data-glide-el=\"controls\">\n          <button class=\"glide__arrow glide__arrow--left\" aria-label=\"Back\" data-glide-dir=\"&#60;\"><span class=\"glide__arrow--icon\"><\/span><\/button>\n      <\/div>\n      <div class=\"glide__arrows\" data-glide-el=\"controls\">\n          <button class=\"glide__arrow glide__arrow--right\" aria-label=\"Before\" data-glide-dir=\"&#62;\"><span class=\"glide__arrow--icon\"><\/span><\/button>\n      <\/div>\n    <\/div>      \n        <div class='glide__bullets' data-glide-el='controls[nav]'>\n    <button class='glide__bullet' aria-label='Go to the 1. Entry' data-glide-dir='=0'><\/button><button class='glide__bullet' aria-label='Go to the 2. Entry' data-glide-dir='=1'><\/button><button class='glide__bullet' aria-label='Go to the 3. Entry' data-glide-dir='=2'><\/button><button class='glide__bullet' aria-label='Go to the 4. Entry' data-glide-dir='=3'><\/button>\n  <\/div>\n  <\/div>\n      <\/div>\n    <\/div>  \n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4755","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Home page - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home page - Cyberagentur\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T12:21:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/04\/CA_Icon_Neu-4.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Home page - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberagentur.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/CA_Icon_Neu-4.svg\",\"datePublished\":\"2024-04-02T07:54:22+00:00\",\"dateModified\":\"2026-04-28T12:21:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/CA_Icon_Neu-4.svg\",\"contentUrl\":\"https:\\\/\\\/www.cyberagentur.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/CA_Icon_Neu-4.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home page\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home page - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/","og_locale":"en_GB","og_type":"article","og_title":"Home page - Cyberagentur","og_url":"https:\/\/www.cyberagentur.de\/en\/","og_site_name":"Cyberagentur","article_modified_time":"2026-04-28T12:21:27+00:00","og_image":[{"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/04\/CA_Icon_Neu-4.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Home page - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/04\/CA_Icon_Neu-4.svg","datePublished":"2024-04-02T07:54:22+00:00","dateModified":"2026-04-28T12:21:27+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/#primaryimage","url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/04\/CA_Icon_Neu-4.svg","contentUrl":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/04\/CA_Icon_Neu-4.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Home page"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/4755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=4755"}],"version-history":[{"count":17,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/4755\/revisions"}],"predecessor-version":[{"id":7203,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/4755\/revisions\/7203"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=4755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}