{"id":622,"date":"2008-12-16T23:34:22","date_gmt":"2008-12-16T21:34:22","guid":{"rendered":"http:\/\/security-planet.de\/?p=622"},"modified":"2008-12-16T23:34:22","modified_gmt":"2008-12-16T21:34:22","slug":"cisco-2008-annual-security-report","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2008\/12\/16\/cisco-2008-annual-security-report\/","title":{"rendered":"Cisco 2008 Annual Security Report"},"content":{"rendered":"<p>Wie sieht die Sicherheit aus Sicht von Cisco aus? Das verr\u00e4t der 2008er Annual Security Report:<\/p>\n<blockquote><p><a href=\"http:\/\/cisco.com\/en\/US\/partner\/prod\/vpndevc\/annual_security_report.html\">Cisco 2008 Annual Security Report<\/a><\/p><\/blockquote>\n<p> Der Download erfordert eine Registrierung.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wie sieht die Sicherheit aus Sicht von Cisco aus? Das verr\u00e4t der 2008er Annual Security Report: Cisco 2008 Annual Security Report Der Download erfordert eine Registrierung.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[5,7],"tags":[24,538,541],"class_list":["post-622","post","type-post","status-publish","format-standard","hentry","category-cisco","category-cisco-security","tag-24","tag-security","tag-security-report"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=622"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/622\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}