{"id":30976,"date":"2023-07-24T21:00:00","date_gmt":"2023-07-25T03:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=30976"},"modified":"2026-03-05T04:55:20","modified_gmt":"2026-03-05T11:55:20","slug":"ressourcen-infografiken-infografik-zum-cyberbedrohungsbericht","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/","title":{"rendered":"Wichtigste Erkenntnisse und Missverst\u00e4ndnisse aus dem Bericht zur Cyber-Bedrohungsvorsorge"},"content":{"rendered":"<section class=\"bs-section bs-section-4b500e99ef8cdebaf3ddaa6a36e7fb461e386ddc bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-d4f201cab41f0341a7cbb32888b9ef9b39ce8318 bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Infografiken<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Wichtigste Erkenntnisse und Missverst\u00e4ndnisse aus dem Bericht zur Cyber-Bedrohungsvorsorge<\/h1>\n\n\n<p>Swimlane hat sich mit Dimensional Research, einem f\u00fchrenden unabh\u00e4ngigen Marktforschungsunternehmen, zusammengetan, um die Wahrnehmung von Cybersicherheit, aktuelle Trends und die Erfolgsfaktoren effektiver Sicherheitsoperationen (SecOps) zu untersuchen. Diese Infografik verdeutlicht die zentrale Diskrepanz zwischen den Ansichten von F\u00fchrungskr\u00e4ften und Analysten.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column  col-sm-0 col-md-12   bs-column-5c965a622edf4209812894e81416a84e7ad33ed8 bs-column---default\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div class=\"wppdfemb-frame-container-1\" style=\"-webkit-overflow-scrolling:auto;\">\n\t\t\t<iframe class=\"pdfembed-iframe nonfullscreen wppdf-emb-iframe-1\"\n\t\t\t\tsrc=\"https:\/\/swimlane.com\/de\/?pdfemb-data=eyJwZGZJRCI6MzA5NzcsInVybCI6Imh0dHBzOlwvXC9zd2ltbGFuZS5jb21cL3dwLWNvbnRlbnRcL3VwbG9hZHNcL1N3aW1sYW5lLTIwMjMtQ3liZXItVGhyZWF0LVJlcG9ydC1JbmZvZ3JhcGhpYy5wZGYiLCJUcnBDb250ZW50UmVzdHJpY3Rpb24iOnsicmVzdHJpY3Rpb25fdHlwZSI6ImV4Y2x1ZGUiLCJzZWxlY3RlZF9sYW5ndWFnZXMiOltdLCJwYW5lbF9vcGVuIjp0cnVlfSwiaW5kZXgiOjEsIndtX3RleHQiOiIifQ\"\n\t\t\t\t\t\t\t\tdata-pdf-id=\"30977\"\n\t\t\t\tdata-pdf-index=\"1\"\n\t\t\t\tstyle=\"border:none;width:100%;max-width:100%;height:100vh;\"\n\t\t\t\tscrolling=\"yes\">\n\t\t\t<\/iframe>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-aa6eb5dfda60c91b965e7c072905992179763573 bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Das k\u00f6nnte Sie auch interessieren<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-b43fa869b558d43fa93bdd41503b8820f2f54817 bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e90b4a9aed5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/e-books\/a-buyers-guide-for-modern-security-automation\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/image_2024-06-11_095344781.png' class='img-fluid' alt='' title='image_2024-06-11_095344781'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>E-Book<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Ein Einkaufsf\u00fchrer f\u00fcr moderne Sicherheitsautomatisierung<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e90b4a9ccec bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/incomm-payments-customer-story\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/incomm_msthead.webp' class='img-fluid' alt='' title='Incomm_Msthead' loading=\"lazy\"  \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Warum InComm Payments sich f\u00fcr Swimlane zur Vereinheitlichung seiner Technologiearchitektur entschieden hat<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e90b4a9e42d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/CRR_Masthead.png' class='img-fluid' alt='' title='CRR_Masthead' loading=\"lazy\"  \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Bereitschaft f\u00fcr Cyberbedrohungen: M\u00fcssen wir Alarm schlagen?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":30721,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[114],"resource-topic":[133],"resource-industry":[93,100],"blog-category":[],"class_list":["post-30976","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-infographics","resource-topic-research","resource-industry-automation","resource-industry-orchestration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Readiness Infographic<\/title>\n<meta name=\"description\" content=\"This infographic of the Cyber Threat Readiness Report shares key findings, misconceptions, and the secret to effective SecOps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/ressourcen\/infografiken\/infografik-zum-bericht-uber-cyberbedrohungen\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Findings and Misconceptions from the Cyber Threat Readiness Report\" \/>\n<meta property=\"og:description\" content=\"This executive summary of the Cyber Threat Readiness Report shares key findings, misconceptions, and the secret to effective SecOps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/ressourcen\/infografiken\/infografik-zum-bericht-uber-cyberbedrohungen\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T11:55:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/CyberReadinessReportgraphic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1810\" \/>\n\t<meta property=\"og:image:height\" content=\"1720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Key Findings and Misconceptions from the Cyber Threat Readiness Report Key Findings and Misconceptions from the Cyber Threat Readiness Report\" \/>\n<meta name=\"twitter:description\" content=\"This executive summary of the Cyber Threat Readiness Report shares key findings, misconceptions, and the secret to effective SecOps.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/CyberReadinessReportgraphic.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/infographics\\\/cyber-threat-report-infographic\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/infographics\\\/cyber-threat-report-infographic\\\/\",\"name\":\"Cyber Threat Readiness Infographic\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/infographics\\\/cyber-threat-report-infographic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/infographics\\\/cyber-threat-report-infographic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/CyberReadinessReportgraphic.png\",\"datePublished\":\"2023-07-25T03:00:00+00:00\",\"dateModified\":\"2026-03-05T11:55:20+00:00\",\"description\":\"This infographic of the Cyber Threat Readiness Report shares key findings, misconceptions, and the secret to effective SecOps.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/infographics\\\/cyber-threat-report-infographic\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/infographics\\\/cyber-threat-report-infographic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/infographics\\\/cyber-threat-report-infographic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/CyberReadinessReportgraphic.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/CyberReadinessReportgraphic.png\",\"width\":1810,\"height\":1720,\"caption\":\"Infographic showing cybersecurity talent shortage stats and benefits of low-code security automation with percentage charts.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/infographics\\\/cyber-threat-report-infographic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Findings and Misconceptions from the Cyber Threat Readiness Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infografik zur Cyber-Bedrohungsvorsorge","description":"Diese Infografik zum Cyber Threat Readiness Report pr\u00e4sentiert wichtige Erkenntnisse, Missverst\u00e4ndnisse und das Geheimnis effektiver SecOps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/ressourcen\/infografiken\/infografik-zum-bericht-uber-cyberbedrohungen\/","og_locale":"de_DE","og_type":"article","og_title":"Key Findings and Misconceptions from the Cyber Threat Readiness Report","og_description":"This executive summary of the Cyber Threat Readiness Report shares key findings, misconceptions, and the secret to effective SecOps.","og_url":"https:\/\/swimlane.com\/de\/ressourcen\/infografiken\/infografik-zum-bericht-uber-cyberbedrohungen\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-05T11:55:20+00:00","og_image":[{"width":1810,"height":1720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/CyberReadinessReportgraphic.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Key Findings and Misconceptions from the Cyber Threat Readiness Report Key Findings and Misconceptions from the Cyber Threat Readiness Report","twitter_description":"This executive summary of the Cyber Threat Readiness Report shares key findings, misconceptions, and the secret to effective SecOps.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/CyberReadinessReportgraphic.png","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/","url":"https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/","name":"Infografik zur Cyber-Bedrohungsvorsorge","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/CyberReadinessReportgraphic.png","datePublished":"2023-07-25T03:00:00+00:00","dateModified":"2026-03-05T11:55:20+00:00","description":"Diese Infografik zum Cyber Threat Readiness Report pr\u00e4sentiert wichtige Erkenntnisse, Missverst\u00e4ndnisse und das Geheimnis effektiver SecOps.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/CyberReadinessReportgraphic.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/CyberReadinessReportgraphic.png","width":1810,"height":1720,"caption":"Infographic showing cybersecurity talent shortage stats and benefits of low-code security automation with percentage charts."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/resources\/infographics\/cyber-threat-report-infographic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Key Findings and Misconceptions from the Cyber Threat Readiness Report"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/30976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/30976\/revisions"}],"predecessor-version":[{"id":54545,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/30976\/revisions\/54545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/30721"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=30976"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=30976"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=30976"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=30976"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=30976"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=30976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}