{"id":9906,"date":"2015-10-20T11:03:00","date_gmt":"2015-10-20T17:03:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/cyber-security-incident-response-for-your-car\/"},"modified":"2025-01-10T10:12:55","modified_gmt":"2025-01-10T17:12:55","slug":"reaktion-auf-cybersicherheitsvorfalle-fur-ihr-auto","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/","title":{"rendered":"Cybersicherheit und Reaktion auf Sicherheitsvorf\u00e4lle f\u00fcr Ihr Auto?"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Dichter Verkehr auf mehrspurigen Autobahnen bei Sonnenaufgang oder Sonnenuntergang, wobei sich das Sonnenlicht in den Windschutzscheiben der Autos spiegelt.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-10-20T11:03:00-06:00\">20. Oktober 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Cybersicherheit und Reaktion auf Sicherheitsvorf\u00e4lle f\u00fcr Ihr Auto?<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"Benutzeravatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Leseminute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-Mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Cybersecurity%20and%20incident%20response%20for%20your%20car%3F').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcyber-security-incident-response-for-your-car%2F', '_blank')\" title=\"E-Mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Cybersecurity%20and%20incident%20response%20for%20your%20car%3F&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcyber-security-incident-response-for-your-car%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcyber-security-incident-response-for-your-car%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcyber-security-incident-response-for-your-car%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p>Der Einsatz vernetzter Technologien in unserer Welt nimmt stetig zu; so ist es beispielsweise nicht ungew\u00f6hnlich, dass Autos mit drahtlosen Funktionen wie Bluetooth, WLAN und schl\u00fcssellosen Zugangssystemen ausgestattet sind. Diese Technologien erm\u00f6glichen Freisprechanrufe, integrierte Navigationssysteme und Internetzugang. Leider bieten sie Hackern auch die M\u00f6glichkeit, auf unsere Fahrzeuge zuzugreifen. Nehmen wir den R\u00fcckruf von 1,4 Millionen Fahrzeugen durch Chrysler Anfang des Jahres: Der Hersteller begr\u00fcndete den R\u00fcckruf mit fehlerhaften Fahrzeugcomputersystemen, die leicht infiltriert werden konnten. Der Branchenriese war gezwungen, ein Problem anzugehen, das vor nur zehn Jahren noch undenkbar war.<\/p>\n<p>Chrysler h\u00e4tte die Wahrscheinlichkeit solcher Sicherheitsl\u00fccken aufgrund von Branchenstudien m\u00f6glicherweise vorhersehen k\u00f6nnen. Beispielsweise gelang es im Sommer 2013 zwei Sicherheitsforschern im Rahmen eines Artikels f\u00fcr Forbes, in das Steuerungssystem eines Autos einzudringen. Der Hack erfolgte jedoch nicht drahtlos, da die Laptops der beiden an den On-Board-Diagnoseanschluss des Fahrzeugs angeschlossen waren \u2013 ein g\u00e4ngiger Zugangspunkt f\u00fcr elektronisch gesteuerte Systeme, der von Kfz-Reparaturtechnikern genutzt wird. Die Ergebnisse waren f\u00fcr die Hacker vielversprechend, f\u00fcr die Automobilindustrie jedoch besorgniserregend: Bremsen, Hupe und Lenkrad des Wagens wurden erfolgreich manipuliert, und das Fahrzeug landete in einem Graben.<\/p>\n<p>Leider h\u00f6rten die unerfreulichen Ergebnisse damit nicht auf. Die Forscher untersuchten weiterhin erfolgreich die M\u00f6glichkeit, die drahtlosen Funktionen eines Autos zu nutzen, um mithilfe eines von ihnen entwickelten Codes die Kontrolle dar\u00fcber zu erlangen. Konkret hackten sie sich in das CAN-Bussystem (Controlled Area Network) eines Autos ein, ein einfaches Betriebssystem zur Steuerung verschiedener Prozesse in Fahrzeugen.<\/p>\n<p>Im Juli dieses Jahres wiederholten die beiden Hackerangriffe mit demselben Reporter, der bereits den ersten Artikel verfasst hatte \u2013 diesmal jedoch drahtlos. Der Reporter fuhr mit einem Jeep Cherokee auf eine nahegelegene Autobahn, und sobald die Hacker Zugriff auf das Bordcomputersystem erlangt hatten, brach Chaos aus. Luft str\u00f6mte aus den L\u00fcftungsschlitzen, und alte Hip-Hop-Musik dr\u00f6hnte aus den Lautsprechern. Die zun\u00e4chst harmlos erscheinenden St\u00f6rungen nahmen jedoch schnell eine unerwartete Wendung, als der Fahrer bemerkte, dass der Motor seines Wagens ferngesteuert abgestellt worden war.<\/p>\n<p>Die Erkenntnis, dass Autos auf so gef\u00e4hrliche Weise gehackt werden k\u00f6nnen, veranlasste Chrysler zum R\u00fcckruf von 1,4 Millionen Fahrzeugen. Sollten Sie sich jedoch Sorgen um das Online-System Ihres Fahrzeugs machen, seien Sie beruhigt: Solche Hacks sind nicht einfach durchzuf\u00fchren. Das Hacken eines Autos erfordert Geld, technische Ressourcen und Expertenwissen; daher ist die Wahrscheinlichkeit, dass Ihr Auto aus der Ferne von einem Kriminellen \u00fcbernommen wird, \u00e4u\u00dferst gering.<\/p>\n<p>Mit dem fortschreitenden technologischen Fortschritt werden Autos angesichts der zahlreichen drahtlosen Funktionen, die in Zukunft verf\u00fcgbar sein werden, zunehmend als Erweiterung des pers\u00f6nlichen Netzwerks fungieren. Dies birgt jedoch potenziell ein steigendes Risiko f\u00fcr immer mehr Fahrer. Seit der Entdeckung von Sicherheitsl\u00fccken in Fahrzeugsteuerungssystemen hat die Alliance of Automobile Manufacturers (AAM) laut einem Artikel der LA Times eine zentrale Anlaufstelle f\u00fcr Informationen und Analysen zu Fahrzeugschwachstellen geschaffen. In diesem Fall m\u00fcssen Automobilhersteller sicherstellen, dass ihre Sicherheitsstrategie optimiert ist, um die Angriffe abzuwehren, die nun so leicht m\u00f6glich sind. Mit dieser neuen Anlaufstelle muss die Automobilindustrie zudem eine umfassende Sicherheitsstrategie entwickeln. Eine solche Strategie sollte Folgendes beinhalten: <a href=\"https:\/\/swimlane.com\/de\/losungen\/anwendungsfalle\/reaktion-auf-zwischenfalle\/\">automatisierte Vorfallsreaktion<\/a> Da die steigende Anzahl von Fahrzeugen auf den Stra\u00dfen schnellere Reaktionszeiten auf potenzielle Gefahren erfordert \u2013 schlie\u00dflich prognostiziert Business Insider, dass bis 2020 zehn Millionen selbstfahrende Autos unterwegs sein werden \u2013, steht f\u00fcr die Automobilindustrie mehr auf dem Spiel als je zuvor.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">\u00c4hnliche Beitr\u00e4ge<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69fb455717689 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/nist-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>31. Januar 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Verbesserung der Reaktion auf Sicherheitsvorf\u00e4lle mithilfe des NIST Cybersecurity Framework und der Sicherheitsautomatisierung und -orchestrierung (SAO)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69fb455718e6e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/incident-response-plans\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>20. September 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automatisierung von Reaktionspl\u00e4nen f\u00fcr Cybersicherheitsvorf\u00e4lle<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69fb455719ffa bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/what-is-threat-detection-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9. Oktober 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Was versteht man unter Bedrohungserkennung und -abwehr?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnieren Sie noch heute, um auf dem Laufenden zu bleiben und regelm\u00e4\u00dfig Updates von Swimlane zu erhalten.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Moderner SecOps-Hintergrund: Eine geometrische Gradientengrafik, die einen fl\u00fcssigen Datenfluss und Cloud-native Agilit\u00e4t darstellt.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"de\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9907,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9906","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity in your Car?<\/title>\n<meta name=\"description\" content=\"The use of interconnected technology in our world is continuously on the rise. It is not uncommon for cars to be equipped with wireless tech.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/reaktion-auf-cybersicherheitsvorfalle-fur-ihr-auto\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and incident response for your car?\" \/>\n<meta property=\"og:description\" content=\"The use of interconnected technology in our world is continuously on the rise. It is not uncommon for cars to be equipped with wireless tech.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/reaktion-auf-cybersicherheitsvorfalle-fur-ihr-auto\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:12:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/cyber-security-incident-response-for-your-car\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/cyber-security-incident-response-for-your-car\\\/\",\"name\":\"Cybersecurity in your Car?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/cyber-security-incident-response-for-your-car\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/cyber-security-incident-response-for-your-car\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-cybersecurity-for-your-car.png\",\"datePublished\":\"2015-10-20T17:03:00+00:00\",\"dateModified\":\"2025-01-10T17:12:55+00:00\",\"description\":\"The use of interconnected technology in our world is continuously on the rise. It is not uncommon for cars to be equipped with wireless tech.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/cyber-security-incident-response-for-your-car\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/cyber-security-incident-response-for-your-car\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/cyber-security-incident-response-for-your-car\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-cybersecurity-for-your-car.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-cybersecurity-for-your-car.png\",\"width\":1120,\"height\":696,\"caption\":\"Dense multi-lane highway traffic at sunrise or sunset with sunlight reflecting off car windshields.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/blog\\\/cyber-security-incident-response-for-your-car\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and incident response for your car?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersicherheit in Ihrem Auto?","description":"Der Einsatz vernetzter Technologien in unserer Welt nimmt stetig zu. Es ist nicht mehr ungew\u00f6hnlich, dass Autos mit drahtloser Technologie ausgestattet sind.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/reaktion-auf-cybersicherheitsvorfalle-fur-ihr-auto\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersecurity and incident response for your car?","og_description":"The use of interconnected technology in our world is continuously on the rise. It is not uncommon for cars to be equipped with wireless tech.","og_url":"https:\/\/swimlane.com\/de\/blog\/reaktion-auf-cybersicherheitsvorfalle-fur-ihr-auto\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:12:55+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/","url":"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/","name":"Cybersicherheit in Ihrem Auto?","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car.png","datePublished":"2015-10-20T17:03:00+00:00","dateModified":"2025-01-10T17:12:55+00:00","description":"Der Einsatz vernetzter Technologien in unserer Welt nimmt stetig zu. Es ist nicht mehr ungew\u00f6hnlich, dass Autos mit drahtloser Technologie ausgestattet sind.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-cybersecurity-for-your-car.png","width":1120,"height":696,"caption":"Dense multi-lane highway traffic at sunrise or sunset with sunlight reflecting off car windshields."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/cyber-security-incident-response-for-your-car\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and incident response for your car?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9906\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/9907"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=9906"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=9906"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=9906"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=9906"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=9906"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=9906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}