{"id":85533,"date":"2020-05-12T09:26:52","date_gmt":"2020-05-12T07:26:52","guid":{"rendered":"https:\/\/territorialchallenges.com\/?p=85533"},"modified":"2020-05-12T09:26:52","modified_gmt":"2020-05-12T07:26:52","slug":"industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee","status":"publish","type":"post","link":"https:\/\/territorialchallenges.com\/de\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","title":{"rendered":"Industrie 4.0: Cybersicherheit f\u00fcr eine neu gestaltete Fertigungsindustrie"},"content":{"rendered":"<p>Veraltete IT-Systeme, die mit neuen Verbindungen verbunden sind, weisen Schwachstellen in den Anlagen der Zukunftsindustrie auf. Cyberangriffe stehen f\u00fcr Softwareinstallateure m\u00f6glicherweise nicht ganz oben auf der Liste der Risiken, denen Hersteller als Kunden ausgesetzt sind. Stattdessen tendieren Installateure m\u00f6glicherweise zu\u2026 <\/p>\n<div class=\"pmpro_content_message\">Artikel nur f\u00fcr Abonnenten sichtbar.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Verbindung<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/de\/wp-login.php\/?action=register\">Registrieren<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter... <\/p>\n<div class=\"pmpro_content_message\">Artikel nur f\u00fcr Abonnenten sichtbar.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Verbindung<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/de\/wp-login.php\/?action=register\">Registrieren<\/a><\/div>","protected":false},"author":11,"featured_media":85534,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[17,127],"tags":[],"blocksy_meta":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/territorialchallenges.com\/de\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\" \/>\n<meta property=\"og:description\" content=\"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/territorialchallenges.com\/de\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:site_name\" content=\"Territorial Challenges\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-12T07:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ni.abdi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ni.abdi\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"ni.abdi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"author\":{\"name\":\"ni.abdi\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\"},\"headline\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\",\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"wordCount\":722,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"articleSection\":[\"Industrie 5.0\",\"Actualit\u00e9 Europe\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"url\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/#website\"},\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/territorialchallenges.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/territorialchallenges.com\/#website\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"name\":\"Territorial Challenges\",\"description\":\"Veille Internationale - Strat\u00e9gie Intelligentes - Bonnes pratiques\",\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/territorialchallenges.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/territorialchallenges.com\/#organization\",\"name\":\"Territorial Challenges\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"width\":1832,\"height\":576,\"caption\":\"Territorial Challenges\"},\"image\":{\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\",\"name\":\"ni.abdi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"caption\":\"ni.abdi\"},\"sameAs\":[\"https:\/\/twitter.com\/Ni.abdi\"],\"url\":\"https:\/\/territorialchallenges.com\/de\/author\/ni-abdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/territorialchallenges.com\/de\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_locale":"de_DE","og_type":"article","og_title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","og_description":"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]","og_url":"https:\/\/territorialchallenges.com\/de\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_site_name":"Territorial Challenges","article_published_time":"2020-05-12T07:26:52+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg","type":"image\/jpeg"}],"author":"ni.abdi","twitter_card":"summary_large_image","twitter_creator":"@Ni.abdi","twitter_misc":{"Verfasst von":"ni.abdi","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"author":{"name":"ni.abdi","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f"},"headline":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e","datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"wordCount":722,"commentCount":0,"publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"articleSection":["Industrie 5.0","Actualit\u00e9 Europe"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","url":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/#website"},"datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","breadcrumb":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/territorialchallenges.com\/"},{"@type":"ListItem","position":2,"name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/territorialchallenges.com\/#website","url":"https:\/\/territorialchallenges.com\/","name":"Territoriale Herausforderungen","description":"Internationales Monitoring \u2013 Intelligente Strategien \u2013 Best Practices","publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/territorialchallenges.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/territorialchallenges.com\/#organization","name":"Territoriale Herausforderungen","url":"https:\/\/territorialchallenges.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/","url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","contentUrl":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","width":1832,"height":576,"caption":"Territorial Challenges"},"image":{"@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f","name":"ni.abdi","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","caption":"ni.abdi"},"sameAs":["https:\/\/twitter.com\/Ni.abdi"],"url":"https:\/\/territorialchallenges.com\/de\/author\/ni-abdi\/"}]}},"_links":{"self":[{"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/posts\/85533"}],"collection":[{"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/comments?post=85533"}],"version-history":[{"count":1,"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/posts\/85533\/revisions"}],"predecessor-version":[{"id":85538,"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/posts\/85533\/revisions\/85538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/media\/85534"}],"wp:attachment":[{"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/media?parent=85533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/categories?post=85533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/territorialchallenges.com\/de\/wp-json\/wp\/v2\/tags?post=85533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}