{"version":"1.0","provider_name":"SI Digital Magazine","provider_url":"https:\/\/magazine.swissinformatics.org\/de\/","author_name":"Fridel Rickenbacher","author_url":"https:\/\/magazine.swissinformatics.org\/de\/author\/fridel\/","title":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"caYTZXThca\"><a href=\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/\">Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/embed\/#?secret=caYTZXThca\" width=\"600\" height=\"338\" title=\"&#8222;Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz&#8220; &#8212; SI Digital Magazine\" data-secret=\"caYTZXThca\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2018\/06\/Privacy_Security_ReadersColumn_Winter.png","thumbnail_width":612,"thumbnail_height":344,"description":"Die Digitalisierung von Prozessen in allen Branchen und in der Verwaltung schreitet mit grosser Dynamik voran. Es entstehen laufend neue M\u00f6glichkeiten, neue Prozesse, neue Abh\u00e4ngigkeiten, neue Risiken. Altes wird obsolet und der dynamische \u00abStand der Technik\u00bb immer relevanter und herausfordernder. Dies f\u00fchrte und f\u00fchrt zur Forderung, dass bereits in der Grundschule nicht nur IT-Anwenderwissen vermittelt [&hellip;]"}