{"version":"1.0","provider_name":"Risparmiare","provider_url":"https:\/\/news.save.ch\/it","author_name":"Roger Str\u00e4ssle","author_url":"https:\/\/news.save.ch\/it\/author\/roger-straessle\/","title":"Leitfaden zur technischen Umsetzung von IoT-Security - Save","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"geRePoBzK7\"><a href=\"https:\/\/news.save.ch\/it\/leitfaden-zur-technischen-umsetzung-von-iot-security\/\">Guida all'implementazione tecnica della sicurezza IoT<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/news.save.ch\/it\/leitfaden-zur-technischen-umsetzung-von-iot-security\/embed\/#?secret=geRePoBzK7\" width=\"600\" height=\"338\" title=\"&quot;Guida all&#039;implementazione tecnica della sicurezza IoT&quot; - Save\" data-secret=\"geRePoBzK7\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/news.save.ch\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","thumbnail_width":1000,"thumbnail_height":667,"description":"Der neue Leitfaden \u201eSecurity Maturity Model (SMM) Practioner\u2019s Guide\u201c, den Experten von Kaspersky Lab gemeinsam mit weiteren Mitgliedern des Industrial Internet Consortium (IIC) entwickelt haben, baut auf Konzepten auf, die im Jahr 2016 als IIC Industrial Internet Security Framework\u00a0definiert wurden. Das Modell besch\u00e4ftige sich als erstes seiner Art mit dem neu etablierten Security-Maturity-Ansatz (Security-Reifegrad) f\u00fcr [&hellip;]"}