{"id":508,"date":"2025-10-11T11:22:29","date_gmt":"2025-10-11T11:22:29","guid":{"rendered":"https:\/\/fullcyrcle-security.test\/startseite\/"},"modified":"2026-02-19T09:31:07","modified_gmt":"2026-02-19T09:31:07","slug":"startseite","status":"publish","type":"page","link":"https:\/\/fullcyrcle-security.com\/de\/","title":{"rendered":"Startseite"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"508\" class=\"elementor elementor-508 elementor-15\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f01b7eb e-con-full e-flex e-con e-parent\" data-id=\"f01b7eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ec900cc e-con-full e-flex e-con e-child\" data-id=\"ec900cc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fce0daa elementor-widget elementor-widget-heading\" data-id=\"fce0daa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">DRIVING<br>CYBER SECURITY BY<br>CULTURE<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e87cf7a e-grid e-con-boxed e-con e-child\" data-id=\"e87cf7a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dac884 elementor-widget elementor-widget-heading\" data-id=\"9dac884\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FullCyrcle Security \u2013 das ist nicht nur ein Name, sondern eine Haltung.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-648f33a elementor-widget elementor-widget-text-editor\" data-id=\"648f33a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cyber Security ist ein nat\u00fcrlicher Bestandteil moderner Softwareentwicklungsprozesse. Wir glaube, dass Sicherheit ist nicht nur eine technische Herausforderung, sondern auch eine Frage der Unternehmenskultur ist.<\/p>\n<p>Mit praxiserprobten Trainings, einem klar strukturierten Ansatz f\u00fcr einen sicheren Software Development Lifecycle (SSDLC) und Security-Champions-Programmen, die aus Mitarbeitenden echte Multiplikator*innen machen, st\u00e4rken wir die Cyber-Resilienz unserer Kundinnen und Kunden \u2013 und damit ihre Zukunfts- und Wettbewerbsf\u00e4higkeit.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a2fa9a e-flex e-con-boxed e-con e-child\" data-id=\"4a2fa9a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0d84e66 e-con-full e-flex e-con e-child\" data-id=\"0d84e66\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9be9fe5 e-con-full e-flex e-con e-child\" data-id=\"9be9fe5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d544f13 elementor-widget elementor-widget-heading\" data-id=\"d544f13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sichere Software<br>Entwicklungs-Prozesse (SSDLC)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73c8e58 elementor-widget elementor-widget-text-editor\" data-id=\"73c8e58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Sicher entwickeln \u2013 mit Struktur statt Last-Minute-Security.<\/strong><\/p>\n<p>Ein durchdachter Software Development Lifecycle (SSDLC) hilft Ihnen, Security systematisch in den Entwicklungsprozess zu integrieren \u2013 von der Planung bis zum Betrieb.<br \/>Das Ergebnis: weniger Reibung, fr\u00fchere Risikobehandlung, nachweisbare Compliance \u2013 und sichere Software, die wirklich funktioniert.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-682f786 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"682f786\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fullcyrcle-security.test\/secure-software-development-life-cycle\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr erfahren<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5767425 e-transform elementor-widget elementor-widget-image\" data-id=\"5767425\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateY_effect&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:-50,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_tablet&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_mobile&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/fullcyrcle-security.com\/wp-content\/uploads\/2025\/10\/circular-no-text.png\" class=\"attachment-large size-large wp-image-479\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad81d64 e-con-full e-flex e-con e-child\" data-id=\"ad81d64\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-68561a2 e-con-full e-flex e-con e-child\" data-id=\"68561a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b0cee0 elementor-widget elementor-widget-heading\" data-id=\"9b0cee0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Aufbau eines<br>Security Champions Programms<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-236bc6b elementor-widget elementor-widget-text-editor\" data-id=\"236bc6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Security ist Teamwork \u2013 aber oft fehlt die Struktur daf\u00fcr.<\/strong><\/p>\n<p>Ein Security Champions Programm ist ein strategischer Hebel, um Prozesse zu sch\u00e4rfen, Kultur zu ver\u00e4ndern und Sicherheit nachhaltig im Unternehmen zu verankern. Statt Security nur zentral zu denken, verteilt es Verantwortung dorthin, wo tagt\u00e4glich sicherheitsrelevante Entscheidungen getroffen werden \u2013 in die Teams. Es schafft Sichtbarkeit f\u00fcr Security-Themen, st\u00e4rkt Eigenverantwortung und macht Security skalierbar.<br data-start=\"768\" data-end=\"771\">Ein Security Champions Programm schafft die n\u00f6tigen Strukturen f\u00fcr einen systematischer Kulturwandel.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-856ca07 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"856ca07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fullcyrcle-security.test\/de\/aufbau-eines-security-champions-programms\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr erfahren<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0531450 e-transform elementor-widget elementor-widget-image\" data-id=\"0531450\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateY_effect&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:-35,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_tablet&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_mobile&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/fullcyrcle-security.com\/wp-content\/uploads\/2025\/10\/circles-no-text.png\" class=\"attachment-large size-large wp-image-480\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ede5e4f e-flex e-con-boxed e-con e-child\" data-id=\"ede5e4f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73052d5 elementor-widget elementor-widget-heading\" data-id=\"73052d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Team<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44477f9 elementor-widget elementor-widget-image\" data-id=\"44477f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"505\" src=\"https:\/\/fullcyrcle-security.com\/wp-content\/uploads\/2025\/10\/gruppenbild.jpg\" class=\"attachment-large size-large wp-image-481\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81f3033 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"81f3033\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fullcyrcle-security.test\/de\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Treffen Sie uns<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f81c86 e-flex e-con-boxed e-con e-child\" data-id=\"6f81c86\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2ab4a34 e-con-full e-flex e-con e-child\" data-id=\"2ab4a34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2482965 elementor-widget elementor-widget-heading\" data-id=\"2482965\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Lernen<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-069fd83 elementor-widget elementor-widget-heading\" data-id=\"069fd83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trainings<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50f429d e-con-full e-flex e-con e-child\" data-id=\"50f429d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b091283 e-con-full e-flex e-con e-child\" data-id=\"b091283\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-52d223a e-con-full e-flex e-con e-child\" data-id=\"52d223a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0c384e elementor-widget elementor-widget-heading\" data-id=\"c0c384e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security Champions Training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2141c87 elementor-widget elementor-widget-text-editor\" data-id=\"2141c87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sie m\u00f6chten ein Security Champions-Programm f\u00fcr Ihr Unternehmen aufbauen? In dieser Schulung lernen Sie die Bausteine f\u00fcr ein Security Champions-Programm kennen, erfahren, wie Sie es messen und skalieren k\u00f6nnen, und wie Sie Ihr Programm zum Erfolg f\u00fchren.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af7b411 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"af7b411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"mailto:hello@fullcyrcle-security.com\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr erfahren<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3b0fd6 elementor-widget elementor-widget-image\" data-id=\"d3b0fd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/fullcyrcle-security.com\/wp-content\/uploads\/2025\/10\/training-security.png\" class=\"attachment-large size-large wp-image-482\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb11947 e-con-full e-flex e-con e-child\" data-id=\"bb11947\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-989395c e-con-full e-flex e-con e-child\" data-id=\"989395c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1619a6a elementor-widget elementor-widget-heading\" data-id=\"1619a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Grundlagen der sicheren<br>Softwareentwicklung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62f18e7 elementor-widget elementor-widget-text-editor\" data-id=\"62f18e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Unsere Basis-Schulung vermittelt Softwareentwickler*innen wichtige F\u00e4higkeiten zur Erkennung, Pr\u00e4vention und Behebung der h\u00e4ufigsten Sicherheitsl\u00fccken und st\u00e4rkt so die Cybersicherheit Ihres Unternehmens von innen heraus. Anhand praktischer \u00dcbungen und Beispiele aus der Praxis lernen Entwickler*innen sichere Programmierpraktiken kennen.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9fddf9 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"f9fddf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"mailto:hello@fullcyrcle-security.com\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr erfahren<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70021f7 elementor-widget elementor-widget-image\" data-id=\"70021f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/fullcyrcle-security.com\/wp-content\/uploads\/2025\/10\/training-dev.png\" class=\"attachment-large size-large wp-image-483\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DRIVINGCYBER SECURITY BYCULTURE FullCyrcle Security \u2013 das ist nicht nur ein Name, sondern eine Haltung. Cyber Security ist ein nat\u00fcrlicher Bestandteil moderner Softwareentwicklungsprozesse. Wir glaube, dass Sicherheit ist nicht nur eine technische Herausforderung, sondern auch eine Frage der Unternehmenskultur ist. Mit praxiserprobten Trainings, einem klar strukturierten Ansatz f\u00fcr einen sicheren Software Development Lifecycle (SSDLC) und [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-508","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fullcyrcle-security.com\/de\/wp-json\/wp\/v2\/pages\/508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fullcyrcle-security.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fullcyrcle-security.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fullcyrcle-security.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fullcyrcle-security.com\/de\/wp-json\/wp\/v2\/comments?post=508"}],"version-history":[{"count":3,"href":"https:\/\/fullcyrcle-security.com\/de\/wp-json\/wp\/v2\/pages\/508\/revisions"}],"predecessor-version":[{"id":511,"href":"https:\/\/fullcyrcle-security.com\/de\/wp-json\/wp\/v2\/pages\/508\/revisions\/511"}],"wp:attachment":[{"href":"https:\/\/fullcyrcle-security.com\/de\/wp-json\/wp\/v2\/media?parent=508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}