{"id":4763,"date":"2025-01-20T12:25:36","date_gmt":"2025-01-20T11:25:36","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/\/"},"modified":"2025-01-23T09:12:09","modified_gmt":"2025-01-23T08:12:09","slug":"a-milestone-for-it-security-in-germany","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/","title":{"rendered":"A milestone for IT security in Germany"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>Cyberagentur signs five contracts for the &#8220;Trusted IT Ecosystem&#8221; research program<\/strong><\/h2>\n  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt-1024x683.jpg\" class=\"attachment-large size-large\" alt=\"Das Projektteam um Dr. Sebastian Jester (links) feiert heute den offiziellen Start f\u00fcr das \u00d6vIT-Forschungsprogramm\" srcset=\"\/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt-1024x683.jpg 1024w, \/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt-330x220.jpg 330w, \/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt-768x512.jpg 768w, \/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt-512x341.jpg 512w, \/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>Das Projektteam um Dr. Sebastian Jester (links) feiert heute den offiziellen Start f\u00fcr das \u00d6vIT-Forschungsprogramm<\/span> \n      \n      \n    <\/figcaption>\n  <\/figure>\n<p><strong>The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) signs contracts with five companies for the &#8220;Trustworthy IT Ecosystem&#8221; (\u00d6vIT) research program on 20 January 2025. The aim is to formally verify verifiable IT security and establish a network of experts and users. <\/strong><\/p>\n\n<p>&#8220;The Cyberagentur has taken another decisive step towards technological sovereignty with the signing of the contract for the research projects in the &#8220;Trustworthy IT Ecosystem&#8221; (\u00d6vIT) programme,&#8221; emphasized Dr Markus Richter, State Secretary at the Federal Ministry of the Interior and for Home Affairs and CIO of the Federal Government, in his keynote speech at the contract signing ceremony, which he delivered via video link. &#8220;With this research program, we are strengthening Germany&#8217;s position as a pioneer in cyber security.&#8221; The event took place at the Leopoldina &#8211; National Academy of Sciences in Halle (Saale).  <\/p>\n\n<p>Neben der Keynote verwies der Leiter des Projektb\u00fcros Dresden der Cyberagentur, Dr. Christoph Hof, auf die strategischen Ziele und den innovativen Charakter dieses Forschungsprogramms innerhalb der Strategie der Innovationsagentur. Mit \u00d6vIT verfolgt die Cyberagentur das Ziel, durch mathematisch-logische Verfahren IT-Sicherheit auf ein bisher unerreichtes Niveau zu heben. Die Abwesenheit von ma\u00dfgeblichen Sicherheitsl\u00fccken soll nachweisbar gemacht werden \u2013 ein entscheidender Schritt, um sowohl hochkomplexe IT-Systeme als auch kritische Infrastrukturen sicherer zu gestalten.<\/p>\n\n<p>The focus of the research program is international and is not only aimed at interested parties in Germany and the European Union, but also from NATO countries and beyond. &#8220;The topic of IT security, as we want it to be considered, does not stop at physical borders due to the globalization of supply chains,&#8221; explains Prof. Dr. Matthias Kranz, Head of the Cyberagentur&#8217;s Secure Systems department. &#8220;This is why we have already been able to build on a large international response to the proposals, which is ultimately also reflected in the selection of the most innovative project partners with world-leading experts. This allows us to work together with our friendly nations and value partners on IT security.&#8221;  <\/p>\n\n<p>As part of \u00d6vIT, contracts were awarded to five national and international companies that will drive the project forward with specific focal points:<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Projekt \u201eFormula-V\u201c<\/strong><\/li>\n<\/ul>\n\n<p>Barkhausen Institut gGmbH (Dresden) with subcontractors Technische Unversit\u00e4t Berlin, Ferrous Systems GmbH, Technische Universit\u00e4t Dresden, Kernkonzept GmbH, Fraunhofer AISEC (Munich)<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Projekt \u201ePROTECT\u201c<\/strong><\/li>\n<\/ul>\n\n<p>German Research Center for Artificial Intelligence (DFKI) Bremen, with subcontractors RWTH Aachen, Cryspen SARL (Paris), Gesellschaft f\u00fcr Informatik e.V. (Berlin\/Bonn), Rheinland-Pf\u00e4lzische Technische Universit\u00e4t (RPTU) Kaiserslautern, LUBIS EDA GmbH (Kaiserslautern), Universit\u00e4t zu L\u00fcbeck<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Projekt der Firma Kry10 (Wellington, NZ)<\/strong><\/li>\n<\/ul>\n\n<p>with subcontractor Proofcraft (Sydney, AU)<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Projekt \u201eClash Formal\u201c<\/strong><\/li>\n<\/ul>\n\n<p>QBayLogic B. V., (Enschede, NL)<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Projekt \u201ePISTIs-V\u201c<\/strong><\/li>\n<\/ul>\n\n<p>Plan-V GmbH (M\u00fcnchen) mit Unterauftragnehmern University of New South Wales (Sydney) und Universit\u00e4t G\u00f6teborg<\/p>\n\n<p>Der Neuseel\u00e4ndische Botschafter, S.E. Craig Hawke, zeigte besonderes Interesse an den Projektpartner aus seinem Heimatland und freute sich, dass Kry10 aus Wellington es mit ihrem Ideenansatz in die Umsetzungsphase des Forschungsprogramms geschafft hatte.<\/p>\n\n<p>&#8220;\u00d6vIT not only stands for technological innovation,&#8221; explained the program manager, Dr. Sebastian Jester, Head of Secure Hardware and Supply Chains in the Cyberagentur&#8217;s Secure Systems department, &#8220;but also for building an active community of researchers, commercial providers and users&#8221;. The aim is to simplify the usability of formal verification methods and promote the transfer of knowledge. &#8220;An important step for community building is that the Cyberagentur will become a member of the seL4 Foundation at the start of the \u00d6vIT projects,&#8221; continues Dr. Jester. In the Kry10 and Plan-V projects, the Cyberagentur is also funding the further development of seL4, the formally verified operating system microkernel, which is freely available and verifiable as an open source project and whose maintenance is coordinated by the seL4 Foundation. The Cyberagentur&#8217;s membership emphasizes the importance of this approach for cyber security and is intended to recruit further supporters.    <\/p>\n\n<p>Die Cyberagentur finanziert das Forschungsprogramm \u00fcber die kommenden 4 Jahre mit rund 42\u00a0Millionen Euro. Vorausgegangen waren f\u00fcnf Vorstudien, mit deren Hilfe die Cyberagentur den Stand der Technik erfasst und Forschungspriorit\u00e4ten f\u00fcr die jetzt startenden Projekte definiert hat. Das Programm wurde in der Abteilung \u201eSichere Systeme\u201c der Cyberagentur definiert und ausgeschrieben und wird mit Start der Projekte durch das Projektb\u00fcro Dresden unter Leitung von Dr. Christoph Hof begleitet: \u201eWir freuen uns, mit den Projektpartner als erstes gro\u00dfes Programm von Dresden aus zusammenzuarbeiten und das Zentrum des neuen \u00d6kosystem vertrauensw\u00fcrdiger IT zu werden.\u201c<\/p>\n\n<p><strong>Further information and registration:<\/strong><\/p>\n\n<p><a href=\"https:\/\/www.cyberagentur.de\/programme\/oevit\/\">https:\/\/www.cyberagentur.de\/programme\/oevit\/<\/a><\/p>\n\n<p><a href=\"https:\/\/www.cyberagentur.de\/schwerpunkte\/sichere-systeme\/\">https:\/\/www.cyberagentur.de\/schwerpunkte\/sichere-systeme\/<\/a><\/p>\n\n<p><a href=\"https:\/\/sel4.systems\">https:\/\/sel4.systems<\/a><\/p>\n\n<p><a href=\"https:\/\/sel4.systems\/news\/#member-cyberagentur\">https:\/\/sel4.systems\/news\/#member-cyberagentur<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberagentur signs five contracts for the &#8220;Trusted IT Ecosystem&#8221; research program The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) signs contracts with five companies for the &#8220;Trustworthy IT Ecosystem&#8221; (\u00d6vIT) research program on 20 January 2025. The aim is to formally verify verifiable IT security and establish a network of experts and users. &#8220;The [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":4769,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[54],"tags":[],"class_list":["post-4763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-systems"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A milestone for IT security in Germany - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A milestone for IT security in Germany - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Cyberagentur signs five contracts for the &#8220;Trusted IT Ecosystem&#8221; research program The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) signs contracts with five companies for the &#8220;Trustworthy IT Ecosystem&#8221; (\u00d6vIT) research program on 20 January 2025. The aim is to formally verify verifiable IT security and establish a network of experts and users. &#8220;The [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-20T11:25:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-23T08:12:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"A milestone for IT security in Germany\",\"datePublished\":\"2025-01-20T11:25:36+00:00\",\"dateModified\":\"2025-01-23T08:12:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/\"},\"wordCount\":776,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/PM-Leopoldina-Auftakt.jpg\",\"articleSection\":[\"Secure systems\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/\",\"name\":\"A milestone for IT security in Germany - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/PM-Leopoldina-Auftakt.jpg\",\"datePublished\":\"2025-01-20T11:25:36+00:00\",\"dateModified\":\"2025-01-23T08:12:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/PM-Leopoldina-Auftakt.jpg\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/PM-Leopoldina-Auftakt.jpg\",\"width\":1500,\"height\":1000,\"caption\":\"Das Projektteam um Dr. Sebastian Jester (links) feiert heute den offiziellen Start f\u00fcr das \u00d6vIT-Forschungsprogramm\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/a-milestone-for-it-security-in-germany\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A milestone for IT security in Germany\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A milestone for IT security in Germany - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/","og_locale":"en_GB","og_type":"article","og_title":"A milestone for IT security in Germany - Cyberagentur","og_description":"Cyberagentur signs five contracts for the &#8220;Trusted IT Ecosystem&#8221; research program The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) signs contracts with five companies for the &#8220;Trustworthy IT Ecosystem&#8221; (\u00d6vIT) research program on 20 January 2025. The aim is to formally verify verifiable IT security and establish a network of experts and users. &#8220;The [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/","og_site_name":"Cyberagentur","article_published_time":"2025-01-20T11:25:36+00:00","article_modified_time":"2025-01-23T08:12:09+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt.jpg","type":"image\/jpeg"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"A milestone for IT security in Germany","datePublished":"2025-01-20T11:25:36+00:00","dateModified":"2025-01-23T08:12:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/"},"wordCount":776,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt.jpg","articleSection":["Secure systems"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/","name":"A milestone for IT security in Germany - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt.jpg","datePublished":"2025-01-20T11:25:36+00:00","dateModified":"2025-01-23T08:12:09+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/#primaryimage","url":"\/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt.jpg","contentUrl":"\/wp-content\/uploads\/2025\/01\/PM-Leopoldina-Auftakt.jpg","width":1500,"height":1000,"caption":"Das Projektteam um Dr. Sebastian Jester (links) feiert heute den offiziellen Start f\u00fcr das \u00d6vIT-Forschungsprogramm"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/a-milestone-for-it-security-in-germany\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"A milestone for IT security in Germany"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=4763"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4763\/revisions"}],"predecessor-version":[{"id":4789,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4763\/revisions\/4789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/4769"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=4763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=4763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=4763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}