{"id":3742,"date":"2020-02-11T10:48:58","date_gmt":"2020-02-11T09:48:58","guid":{"rendered":"https:\/\/update.phoenixcontact.com\/?p=3742"},"modified":"2020-03-26T13:39:59","modified_gmt":"2020-03-26T12:39:59","slug":"the-network-guardian","status":"publish","type":"post","link":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/","title":{"rendered":"The network guardian"},"content":{"rendered":"\n<p>When data needs to be secure, it\u2019s his finest hour. Dr.&nbsp;Lutz J\u00e4nicke is responsible for the security of products and solutions at Phoenix Contact. An interview about castles, slouch hats, mafia, and motivation.<\/p>\n\n\n\n<p>Dr. Lutz J\u00e4nicke is actually an electrical engineer by nature. But while doing his doctorate and postgraduate work, he stumbled upon the topic. In the meantime, he has become an internationally renowned expert on data security, and the very first person to go to at Phoenix Contact when it comes to the systemic protection of networks. Appropriately, the interview was held in the old castle and palace complex of Bad Pyrmont.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke05.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"988\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke05.jpg\" alt=\"Dr. Lutz J\u00e4nicke\" class=\"wp-image-3772\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke05.jpg 1000w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke05-300x296.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke05-768x759.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><figcaption>Dr. Lutz J\u00e4nicke<\/figcaption><\/figure>\n\n\n\n<p>UPDATE: <em>Dr. J\u00e4nicke, are we safe and secure here?<\/em><\/p>\n\n\n\n<p> (chuckles) Well, maybe 1,000&nbsp;years ago. But how were castles attacked in the past? They fired, stormed, laid siege, and eventually dug tunnels to bring down the walls. In other words, they looked for weak points. This is no different today than it was 1,000&nbsp;years ago. <br>Security was and is not a technical issue, but a process issue. The important thing is that there is no gap. <\/p>\n\n\n\n<p> UPDATE: <em>Once you set up security once, you\u2019re secure for good?<\/em><\/p>\n\n\n\n<p>No, it\u2019s an ongoing process. You have to consider beforehand how to organize your defense in such a way that you are prepared for as many eventualities as possible. And then the defense needs to be as many steps ahead of the attacker as possible. In the Middle Ages you had years to do this, today it has to be done more quickly. <br>Errors often occur in classical patterns. When programming, you also rely on your colleagues having done their job well. If mistakes creep into a labor division, these are the open gates for an attack. The four eyes principle helps in this respect. As with classical castle construction, the defense concept needs to be in place from the very beginning. This is what we mean by security by design. <br>This is labor-intensive, annoying for creative minds, and also expensive. In the end, you end up with a product that doesn\u2019t even look different from an unsafe product, just more  expensive. You have to make an argument from that standpoint first. The legislature is helping with the critical infrastructure. Or look at your our own bitter experience of production downtimes. This can quickly cost several million euros, and can even lead to massive loss of customers due to inability to deliver or corporate collapse. This is referred to as \u201csaving at the wrong end.\u201d <\/p>\n\n\n\n<p>UPDATE: <em>Is the overall threat situation increasing?<\/em><\/p>\n\n\n\n<p>Definitely. Statistics from our industry are difficult to obtain, but the damage reported to the FBI from cybersecurity incidents in the US has increased tenfold over the last ten years, from 2008 to 2018, from 200&nbsp;million to 2&nbsp;billion dollars. These are absolutely realistic figures. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-medium\"><a href=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke06.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke06-300x200.jpg\" alt=\"\" class=\"wp-image-3779\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke06-300x200.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke06-768x512.jpg 768w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke06.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>UPDATE: <em>Who are the bad guys? And what are their motives?<\/em><\/p>\n\n\n\n<p>There are all kinds of different attackers. There\u2019s the individual who acts, but the damage usually isn\u2019t that enormous. This can be for anarchic motives, but also for very tangible  economic reasons. Malware that can actually be purchased is often used, which is also common in apps. <br>Then there are commercial organizations where you can buy high-quality attacks for money, such as service providers for organized crime in Russia. And you hear of Chinese groups  acting upon behalf of the state. The result would be a limbo. <br>And then there are the state actors, such as the NSA, the Chinese People\u2019s Army, or our very own Bundeswehr, which is also in preparation mode. You can get an idea of the alleged  people involved by reading the time stamps of the server activities. Shockingly often, you\u2019ll find matching times from a very specific time zone. Even cyber-pirates keep regular office  hours. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><a href=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke04.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke04-300x200.jpg\" alt=\"\" class=\"wp-image-3771\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke04-300x200.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke04-768x512.jpg 768w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke04.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>UPDATE: <em>How do you train your cyber defenses when you\u2019re one of the \u201cgood guys\u201d yourself? How can you get the tools you need if you yourself aren\u2019t an attacker?<\/em><\/p>\n\n\n\n<p>You don\u2019t have to go the Darknet or anything. Even the NSA publishes tools from time to time, you can just download them. Or buy it on eBay for 10 dollars. You\u2019re also allowed to use them in Germany for laboratory purposes in your own environment, but not for attack purposes in the open field.<br>But you also need the real environment to test your tools, and with it the defense. \u2019If you let such tools haunt your house, however, things can happen in our networked environment <br> that we just can\u2019t control. So we are very careful. But the goal needs to be that our networks can withstand it.<\/p>\n\n\n\n<p>UPDATE: <em>We live in an increasingly networked world. But we only think about safety after something has already happened. Is that an accurate perception?<\/em><\/p>\n\n\n\n<p>Many smaller companies actually act in this way, which is very critical. Larger companies are usually much more cautious. The IT at Phoenix Contact, for example, is always alert. For  example, production is completely decoupled from the normal office network. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><a href=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke07.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke07-300x300.jpg\" alt=\"\" class=\"wp-image-3782\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke07-300x300.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke07-150x150.jpg 150w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke07.jpg 354w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>UPDATE: <em>What made Phoenix Contact start to think about things like this?<\/em><\/p>\n\n\n\n<p>We started in 2002 at the Berlin startup Innominate with the topic of mobile firewalls, but quickly advanced into the field of industrial automation. Phoenix Contact then took over Innominate in 2008. <br>However, the Phoenix Contact Group can\u2019t only rely on firewalls; we also need to consider data security in all its processes. My job is to democratize the topic of security to a certain extent. We make training programs, educate people, develop tools. Everyone who writes software has to face the issue of security and follow certain guidelines. <\/p>\n\n\n\n<p> UPDATE: <em>How does cybersecurity harmonize with classic industry and conventional IT?<\/em> <\/p>\n\n\n\n<p>Quite well, actually. We are the experts for our specialized field. This is generally appreciated in IT. The situation is often quite different in production. Usually there\u2019s no one in charge of security. When a machine is set up, nobody thinks about how it will be cleanly integrated into the network. The last thing they\u2019re going to moan about is why the controller isn\u2019t connected. There\u2019s still a lot of \u201cpulling strings\u201d to be done.  <br>But in financial controlling, we are usually looked at as just a cost factor. That\u2019s not half bad. You can do without. We often suffer very large damages, but these are quite rare. Therefore, everyone believes that it won\u2019t affect their company. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-medium\"><a href=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke02.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"223\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke02-300x223.jpg\" alt=\"\" class=\"wp-image-3767\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke02-300x223.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke02-768x570.jpg 768w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke02.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>UPDATE:  <em>In\u2002which\u2002fields\u2002is\u2002Phoenix\u2002Contact\u2002active\u2002when\u2002it\u2002comes to cybersecurity?<\/em><\/p>\n\n\n\n<p>We are active both in our own company and with customers. This helps in both directions, because it also increases our understanding of consulting in the production areas. And our new certifications show that we can competently map and offer all processes, including stocktaking, installation, commissioning, and training. This is T\u00dcV-tested, quite literally. <br>We have just completed and successfully passed a very complex, multi-stage certification process with T\u00dcV S\u00fcd. This shows how seriously we really take this.  <\/p>\n\n\n\n<p>UPDATE:  <em>In your opinion, what does the future hold for companies when it comes to security?<\/em><\/p>\n\n\n\n<p>In principle, it can be assumed that the massively growing threat will put management under pressure. In the supply chain, customers are putting more pressure on since security is increasingly becoming an issue in supplier evaluation. Legislatively, new rules are also inevitable. <\/p>\n\n\n\n<p>UPDATE:  <em>Openness and privacy \u2013 isn\u2019t the network protection industry itself becoming too invested in exaggerating privacy when it comes to cyber attacks?<\/em><\/p>\n\n\n\n<p>It\u2019s a question of culture. It is true that an exchange about threats and attacks that have occurred is important for everyone. Companies that aren\u2019t listed on the stock exchange  already communicate quite openly here. Concealment is downright harmful. <br>But if, for example, a DAX company reports a successful attack, then share values will also fall. But even here, the way of thinking about it is slowly changing. Everyone is being attacked. It isn\u2019t a sign of weakness. Only those who do not act are acting negligently. And those claiming they haven\u2019t been attacked probably just didn\u2019t notice the attack. <\/p>\n\n\n\n<p>UPDATE: <em>Does that also apply to Phoenix Contact?<\/em><\/p>\n\n\n\n<p>Of course. If we, with our importance on the market, are NOT attacked by certain states from Southeast Asia for the purpose of industrial espionage, then we would have done something  wrong. We also constantly educate ourselves in daily defensive combat, so we\u2019re training for ourselves as well as for our customers.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.phoenixcontact.de\/services\" target=\"_blank\" aria-label=\"phoenixcontact.de\/services (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">phoenixcontact.de\/services<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When data needs to be secure, it\u2019s his finest hour. Dr.&nbsp;Lutz J\u00e4nicke is responsible for the security of products and solutions at Phoenix Contact. An interview about castles, slouch hats, mafia, and motivation. Dr. Lutz J\u00e4nicke is actually an electrical engineer by nature. But while doing his doctorate and postgraduate work, he stumbled upon the &hellip;<\/p>\n","protected":false},"author":2,"featured_media":3762,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":6,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":""},"categories":[267,398,235],"tags":[386,387,49],"class_list":["post-3742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-cyber-security","category-think","tag-innominate","tag-mguard","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The network guardian - UPDATE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The network guardian - UPDATE\" \/>\n<meta property=\"og:description\" content=\"When data needs to be secure, it\u2019s his finest hour. Dr.&nbsp;Lutz J\u00e4nicke is responsible for the security of products and solutions at Phoenix Contact. An interview about castles, slouch hats, mafia, and motivation. Dr. Lutz J\u00e4nicke is actually an electrical engineer by nature. But while doing his doctorate and postgraduate work, he stumbled upon the &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/\" \/>\n<meta property=\"og:site_name\" content=\"UPDATE\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-11T09:48:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-26T12:39:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke-Beitragsbild.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"685\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lutz Odewald\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lutz Odewald\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/\",\"url\":\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/\",\"name\":\"The network guardian - UPDATE\",\"isPartOf\":{\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke-Beitragsbild.jpg\",\"datePublished\":\"2020-02-11T09:48:58+00:00\",\"dateModified\":\"2020-03-26T12:39:59+00:00\",\"author\":{\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/#\/schema\/person\/f2073010bf520f310478ffd9434d0c9e\"},\"breadcrumb\":{\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#primaryimage\",\"url\":\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke-Beitragsbild.jpg\",\"contentUrl\":\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke-Beitragsbild.jpg\",\"width\":1000,\"height\":685},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/update.phoenixcontact.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The network guardian\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/#website\",\"url\":\"https:\/\/update.phoenixcontact.com\/en\/\",\"name\":\"UPDATE\",\"description\":\"Das Innovationsmagazin\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/update.phoenixcontact.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/#\/schema\/person\/f2073010bf520f310478ffd9434d0c9e\",\"name\":\"Lutz Odewald\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/update.phoenixcontact.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8950d3f7c04db4c89dfa89689a8d6c7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8950d3f7c04db4c89dfa89689a8d6c7e?s=96&d=mm&r=g\",\"caption\":\"Lutz Odewald\"},\"description\":\"Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The network guardian - UPDATE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/","og_locale":"en_US","og_type":"article","og_title":"The network guardian - UPDATE","og_description":"When data needs to be secure, it\u2019s his finest hour. Dr.&nbsp;Lutz J\u00e4nicke is responsible for the security of products and solutions at Phoenix Contact. An interview about castles, slouch hats, mafia, and motivation. Dr. Lutz J\u00e4nicke is actually an electrical engineer by nature. But while doing his doctorate and postgraduate work, he stumbled upon the &hellip;","og_url":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/","og_site_name":"UPDATE","article_published_time":"2020-02-11T09:48:58+00:00","article_modified_time":"2020-03-26T12:39:59+00:00","og_image":[{"width":1000,"height":685,"url":"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke-Beitragsbild.jpg","type":"image\/jpeg"}],"author":"Lutz Odewald","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lutz Odewald","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/","url":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/","name":"The network guardian - UPDATE","isPartOf":{"@id":"https:\/\/update.phoenixcontact.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#primaryimage"},"image":{"@id":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#primaryimage"},"thumbnailUrl":"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke-Beitragsbild.jpg","datePublished":"2020-02-11T09:48:58+00:00","dateModified":"2020-03-26T12:39:59+00:00","author":{"@id":"https:\/\/update.phoenixcontact.com\/en\/#\/schema\/person\/f2073010bf520f310478ffd9434d0c9e"},"breadcrumb":{"@id":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#primaryimage","url":"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke-Beitragsbild.jpg","contentUrl":"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/Jaenicke-Beitragsbild.jpg","width":1000,"height":685},{"@type":"BreadcrumbList","@id":"https:\/\/update.phoenixcontact.com\/en\/the-network-guardian\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/update.phoenixcontact.com\/en\/"},{"@type":"ListItem","position":2,"name":"The network guardian"}]},{"@type":"WebSite","@id":"https:\/\/update.phoenixcontact.com\/en\/#website","url":"https:\/\/update.phoenixcontact.com\/en\/","name":"UPDATE","description":"Das Innovationsmagazin","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/update.phoenixcontact.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/update.phoenixcontact.com\/en\/#\/schema\/person\/f2073010bf520f310478ffd9434d0c9e","name":"Lutz Odewald","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/update.phoenixcontact.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8950d3f7c04db4c89dfa89689a8d6c7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8950d3f7c04db4c89dfa89689a8d6c7e?s=96&d=mm&r=g","caption":"Lutz Odewald"},"description":"Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim."}]}},"_links":{"self":[{"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/posts\/3742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/comments?post=3742"}],"version-history":[{"count":1,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/posts\/3742\/revisions"}],"predecessor-version":[{"id":3894,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/posts\/3742\/revisions\/3894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/media\/3762"}],"wp:attachment":[{"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/media?parent=3742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/categories?post=3742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/tags?post=3742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}