{"id":22420,"date":"2023-11-20T14:33:52","date_gmt":"2023-11-20T13:33:52","guid":{"rendered":"https:\/\/news.save.ch\/?p=22420"},"modified":"2023-11-20T14:33:52","modified_gmt":"2023-11-20T13:33:52","slug":"defense-in-depth-klingt-gut-aber-ist-es-das-auch","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","title":{"rendered":"Defense in depth: Sounds good, but is it?"},"content":{"rendered":"<figure id=\"attachment_22421\" aria-describedby=\"caption-attachment-22421\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-22421\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-680x454.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-680x454.jpg 680w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-768x513.jpg 768w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-18x12.jpg 18w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-375x251.jpg 375w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-524x350.jpg 524w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg 1000w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-22421\" class=\"wp-caption-text\">Depositphotos, tataks<\/figcaption><\/figure>\n<p>On paper, the cybersecurity strategy Defense in depth looks better than almost any other security concept: layer upon layer of different tools and processes are used to create a tightly meshed protection around a company's IT infrastructure. This approach is not new, but according to <a href=\"https:\/\/www.ontinue.com\/\" target=\"_blank\" rel=\"noopener\">Ontinue<\/a> In practice, it is becoming increasingly clear that it does not make sense, because even the best firewall, the most sophisticated DNS filter, a holistic EDR (Endpoint Detection and Response) tool, the most elaborate Cloud Access Security Broker (CASB) and other \"best of breed\" security solutions alone are not enough. As the following three examples from Ontinue illustrate, the human factor plays an essential role in cybersecurity.<\/p>\n<h3>1. the configuration chaos is almost impossible to control<\/h3>\n<p>\"A lot helps a lot\" is a double-edged sword in the context of cyber security: many tools only help if the appropriate specialist staff are available to implement, configure, manage and maintain them. However, this is the case in very few companies and even if a large IT team is available, the sheer number of tools that companies use is far too great. Various studies confirm that, on average, organizations use more than 40 security solutions. This flood of software is rarely manageable for SMEs or even large corporations.<\/p>\n<p><strong>2. there is a risk of \"alert fatigue\"<\/strong><\/p>\n<p>Another problem with a very large number of security tools is the constant alerts and warnings: Anyone who surfs the Internet and uses a pop-up blocker will be familiar with the many warning messages, and the typical virus scanner for the operating system also flashes almost continuously - and these are tools for a single user. Scaled to the employees of a company and the large number of additional tools used by both end users and security teams, the number of warning messages quickly increases to an unmanageable level. What then follows is what is known as \"alert fatigue\". It ensures that IT teams can hardly distinguish between critical and non-critical alerts and gaps in the defense against hackers arise.<\/p>\n<h3>3. even under the best of circumstances, security teams are overloaded<\/h3>\n<p>Even if the IT team has perfectly configured the extensive tool set and notification settings, the proverbial end of the line has not yet been reached. The threat situation is becoming more acute every year: the sheer volume of cyberattacks alone is increasing and generative AI is further expanding the technological possibilities for hackers. As a result, security teams have to fight the flood of attacks much more deeply and intensively - the all-important preventative measures and threat intelligence often fall by the wayside.<\/p>\n<h3>Conclusion<\/h3>\n<p>\"Companies need to realize that more tools do not necessarily mean more security,\" warns Jochen Koehler, VP EMEA Sales at Ontinue. \"As secure as Defense in Depth may look in theory, very few companies can implement this approach practically and, above all, successfully without massive personnel expenditure. They should therefore carefully consider whether it would not make more sense to invest their often tight budget in an externalization that offers them maximum protection and the greatest possible resilience with minimal personnel and software acquisition costs.\"<\/p>","protected":false},"excerpt":{"rendered":"<p>Auf dem Papier sieht die Cybersecurity-Strategie Defense in depth so gut aus wie kaum ein anderes Sicherheitskonzept: Aus unterschiedlichen Tools und Verfahren setzt sich Schicht um Schicht ein engmaschiger Schutz rund um die IT-Infrastruktur von Unternehmen zusammen. Neu ist dieser Ansatz nicht, allerdings zeigt sich laut Ontinue in der Praxis immer mehr, dass er nicht [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":22421,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[1134],"class_list":["post-22420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cybersecurity"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":null,"_at_widget":null,"_yoast_wpseo_primary_category":"3313","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defense in depth: Klingt gut, aber ist es das auch? - Save<\/title>\n<meta name=\"description\" content=\"Wie viele Cybersecurity-Tools Unternehmen im Einsatz haben, ist f\u00fcr hohe Sicherheit nicht entscheidend \u2013 klingt komisch, ist aber so.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defense in depth: Klingt gut, aber ist es das auch? - Save\" \/>\n<meta property=\"og:description\" content=\"Wie viele Cybersecurity-Tools Unternehmen im Einsatz haben, ist f\u00fcr hohe Sicherheit nicht entscheidend \u2013 klingt komisch, ist aber so.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-20T13:33:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Defense in depth: Klingt gut, aber ist es das auch?\",\"datePublished\":\"2023-11-20T13:33:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\"},\"wordCount\":518,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Depositphotos_486161436_S.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\",\"name\":\"Defense in depth: Klingt gut, aber ist es das auch? - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Depositphotos_486161436_S.jpg\",\"datePublished\":\"2023-11-20T13:33:52+00:00\",\"description\":\"Wie viele Cybersecurity-Tools Unternehmen im Einsatz haben, ist f\u00fcr hohe Sicherheit nicht entscheidend \u2013 klingt komisch, ist aber so.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Depositphotos_486161436_S.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Depositphotos_486161436_S.jpg\",\"width\":1000,\"height\":668,\"caption\":\"Depositphotos, tataks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defense in depth: Klingt gut, aber ist es das auch?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defense in depth: Sounds good, but is it? - Save","description":"How many cybersecurity tools companies have in use is not decisive for high security - sounds strange, but it is.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","og_locale":"en_US","og_type":"article","og_title":"Defense in depth: Klingt gut, aber ist es das auch? - Save","og_description":"Wie viele Cybersecurity-Tools Unternehmen im Einsatz haben, ist f\u00fcr hohe Sicherheit nicht entscheidend \u2013 klingt komisch, ist aber so.","og_url":"https:\/\/news.save.ch\/en\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","og_site_name":"Save","article_published_time":"2023-11-20T13:33:52+00:00","og_image":[{"width":1000,"height":668,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Defense in depth: Klingt gut, aber ist es das auch?","datePublished":"2023-11-20T13:33:52+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/"},"wordCount":518,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","keywords":["Cybersecurity"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","url":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","name":"Defense in depth: Sounds good, but is it? - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","datePublished":"2023-11-20T13:33:52+00:00","description":"How many cybersecurity tools companies have in use is not decisive for high security - sounds strange, but it is.","breadcrumb":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","width":1000,"height":668,"caption":"Depositphotos, tataks"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Defense in depth: Klingt gut, aber ist es das auch?"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=22420"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22420\/revisions"}],"predecessor-version":[{"id":22422,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22420\/revisions\/22422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/22421"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=22420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=22420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=22420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}