{"id":2814,"date":"2022-03-24T19:00:00","date_gmt":"2022-03-24T18:00:00","guid":{"rendered":"https:\/\/datenschutz-eprivacy.de\/da\/?p=2814"},"modified":"2022-03-24T17:43:10","modified_gmt":"2022-03-24T16:43:10","slug":"cyberkrieg","status":"publish","type":"post","link":"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/","title":{"rendered":"Podcasthinweis: Cyberkrieg"},"content":{"rendered":"<div itemscope itemtype=\"http:\/\/schema.org\/AudioObject\"><meta itemprop=\"name\" content=\"Podcasthinweis: Cyberkrieg\" \/><meta itemprop=\"uploadDate\" content=\"2022-03-24T19:00:00+01:00\" \/><meta itemprop=\"encodingFormat\" content=\"audio\/mpeg\" \/><meta itemprop=\"duration\" content=\"PT24M43S\" \/><meta itemprop=\"description\" content=\"Krieg und Konflikt findet heutzutage auch im Internet statt: In den virtuellen Welten, in denen wir uns so tagt\u00e4glich bei Social Media bewegen, findet nat\u00fcrlich menschliche Interaktion, aber nat\u00fcrlich auch menschlicher Konflikt statt. Deutsche Beh\u00f6rd...\" \/><meta itemprop=\"contentUrl\" content=\"https:\/\/media.blubrry.com\/onlinegeister\/schrift-architekt.de\/onlinegeister\/mp3\/Onlinegeister070-Cyberkrieg.mp3\" \/><meta itemprop=\"contentSize\" content=\"22.7\" \/><div class=\"powerpress_player\" id=\"powerpress_player_7540\"><audio class=\"wp-audio-shortcode\" id=\"audio-2814-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/media.blubrry.com\/onlinegeister\/schrift-architekt.de\/onlinegeister\/mp3\/Onlinegeister070-Cyberkrieg.mp3?_=1\" \/><a href=\"https:\/\/media.blubrry.com\/onlinegeister\/schrift-architekt.de\/onlinegeister\/mp3\/Onlinegeister070-Cyberkrieg.mp3\">https:\/\/media.blubrry.com\/onlinegeister\/schrift-architekt.de\/onlinegeister\/mp3\/Onlinegeister070-Cyberkrieg.mp3<\/a><\/audio><\/div><\/div><p class=\"powerpress_links powerpress_links_mp3\" style=\"margin-bottom: 1px !important;\">Podcast: <a href=\"https:\/\/media.blubrry.com\/onlinegeister\/schrift-architekt.de\/onlinegeister\/mp3\/Onlinegeister070-Cyberkrieg.mp3\" class=\"powerpress_link_pinw\" target=\"_blank\" title=\"Play in new window\" onclick=\"return powerpress_pinw('https:\/\/datenschutz-eprivacy.de\/en\/?powerpress_pinw=2814-podcast');\" rel=\"nofollow\">Play in new window<\/a> | <a href=\"https:\/\/media.blubrry.com\/onlinegeister\/schrift-architekt.de\/onlinegeister\/mp3\/Onlinegeister070-Cyberkrieg.mp3\" class=\"powerpress_link_d\" title=\"Download\" rel=\"nofollow\" download=\"Onlinegeister070-Cyberkrieg.mp3\">Download<\/a><\/p><p><strong>Krieg und Konflikt findet heutzutage auch im Internet statt: In den virtuellen Welten, in denen wir uns so tagt\u00e4glich bei Social Media bewegen, findet nat\u00fcrlich menschliche Interaktion, aber nat\u00fcrlich auch menschlicher Konflikt statt. <\/strong><strong>Deutsche Beh\u00f6rden wie das Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Verfassungsschutz oder auch die Bundeswehr warnen vor einer erh\u00f6hten Gerfahrensituation. Doch wie gro\u00df ist eigentlich die Gefahr eines Angriffs und was passiert dann \u00fcberhaupt?<br><\/strong><\/p>\n<p><!--more--><\/p>\n<p><\/p>\n<p><\/p><center><a href=\"https:\/\/podcasts.apple.com\/de\/podcast\/onlinegeister-radio-c3-bcber-netzkultur-social-media\/id1145611583\"><img decoding=\"async\" class=\"alignnone wp-image-4291 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/onlinegeister-abo-itunes-300x114.png\" alt=\"\" width=\"200\" height=\"76\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/76;\"><\/a> <a href=\"https:\/\/open.spotify.com\/show\/40ogXHtfxLusXK5yY2pOY9\"><img decoding=\"async\" class=\"alignnone wp-image-4292 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/onlinegeister-abo-spotify-podcast-300x114.png\" alt=\"\" width=\"200\" height=\"76\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/76;\"><\/a> <a href=\"https:\/\/podcasts.google.com\/feed\/aHR0cHM6Ly9vbmxpbmVnZWlzdGVyLmNvbS9mZWVkL3BvZGNhc3Qv?hl=de\"><img decoding=\"async\" class=\"alignnone wp-image-4401 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/onlinegeister-abo-buttons-google-podcasts-300x114.png\" alt=\"\" width=\"200\" height=\"76\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/76;\"><\/a><\/center><p><\/p>\n<p>Und in eigener Sache ein Hinweis: DER SEMINAR organisiert auch in diesem Jahr wieder das Mitteldeutsche Barcamp, Thema dieses Mal ganz aktuell: Wie sicher ist der digitale Alltag?<\/p>\n<p>Wie sicher sind eigentlich New Work, hybride Arbeit oder Homeschooling? Cyber Security, Datenschutz und digitale Infrastruktur braucht sichere Grundlagen. Das Barcamp liefert L\u00f6sungsans\u00e4tze \u2013 und zwar in lockerer und angenehmer Atmosph\u00e4re.<\/p>\n<p><strong>Mit Experten und Machern gestalten wir die Zukunft sicher. Am 09.09.2022!<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/der-seminar.de\/barcamp\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-5150 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/mitteldeutsches-barcamp-konferenz-halle-saale-leipzig-1024x535.png\" alt=\"\" width=\"845\" height=\"441\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 845px; --smush-placeholder-aspect-ratio: 845\/441;\"><\/a><strong><a href=\"https:\/\/der-seminar.de\/barcamp#kaufen\">JETZT TICKETS BESTELLEN!<\/a><\/strong><\/p>\n<p>Wir treffen uns am 9. September 2022 im Hbf. Halle. Tickets hier bestellen oder an allen lokalen Vorverkaufsstellen.<br><a href=\"https:\/\/der-seminar.de\/barcamp#kaufen\"><strong>JETZT TICKETS KAUFEN!<\/strong><\/a><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_79_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Verzeichnis<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/#Thema_der_Sendung\" >Thema der Sendung<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/#Moderatoren_Gaste\" >Moderatoren &amp; G\u00e4ste<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/#Gespielte_Musik_in_der_Radioversion\" >Gespielte Musik in der Radioversion<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/#Quellen_Links\" >Quellen &amp; Links<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/#Erwahnte_Folgen\" >Erw\u00e4hnte Folgen<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/#Horen_Download\" >H\u00f6ren &amp; Download<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Thema_der_Sendung\"><\/span>Thema der Sendung<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Wir haben detailliert die Zahlen und Eckdaten auseinandergenommen und einen Fachbeitrag zum Thema bei <a href=\"http:\/\/www.socialmediastatistik.de\/\">Social Media Statistiken<\/a> eingestellt:<\/p>\n\n<!-- wp:html--><div class=\"gridContainer\">\n<center><div class=\"wp-block-button\"><a class=\"wp-block-button__link has-accent-1-background-color has-background\" href=\"https:\/\/www.socialmediastatistik.de\/cyberkrieg\" style=\"border-radius:12px\" target=\"_blank\" rel=\"noreferrer noopener\">Unsere Analyse zum Thema<br>bei SocialMediaStatistik.de (folgt)<\/a><\/div><\/center>&nbsp;\n<\/div><!-- \/wp:html-->\n\n<p>F\u00fcr die Sendung haben wir recherchiert und Zahlen sowie Eckdaten ermittelt, auseinandergenommen und einen Fachbeitrag erstellt. Aus den Erkenntnissen und der Auswertung zum Thema haben wir eine tief gehende Analyse mit Take-away und Mehrwert bei SocialMediaStatistik.de verfasst. Weitere Informationen k\u00f6nnen bei uns erfragt werden. Einfach einen Kommentar unter dieser Folge schreiben oder uns <a href=\"mailto:info@onlinegeister.com?subject=Sendungsfrage\">per E-Mail kontaktieren<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Moderatoren_Gaste\"><\/span>Moderatoren &amp; G\u00e4ste<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>An dieser Episode haben in zunehmender Follower-Zahl mitgewirkt:<\/p>\n<ul>\n<li>Moderation und Musik: Tristan Berlet (<a href=\"http:\/\/www.twitter.com\/realDrazon\">Twitter<\/a>)<\/li>\n<li>Co-Moderation und Recherche: Christian Allner (<a href=\"http:\/\/www.der-seminar.de\/produkte\">Tools und Tipps f\u00fcr digitales Arbeiten<\/a>)<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Gespielte_Musik_in_der_Radioversion\"><\/span>Gespielte Musik in der Radioversion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>F\u00fcr alle Songs, siehe unsere <a href=\"https:\/\/open.spotify.com\/playlist\/5wOn1I7HOSyMYUIut6Psob?si=0V--d7cwScO93J73sSlq0Q\">Spotify-Playlist<\/a>. Folgende St\u00fccke liefen bei Radio Corax:<\/p>\n<ul>\n<li>Edwin Starr &#8211; War<\/li>\n<li>SoaD &#8211; B.Y.O.B<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Quellen_Links\"><\/span>Quellen &amp; Links<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>siehe <a href=\"https:\/\/socialmediastatistik.de\/infografik-social-media-universum\/\">SocialMediaStatistik.de<\/a><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Erwahnte_Folgen\"><\/span>Erw\u00e4hnte Folgen<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><a href=\"https:\/\/onlinegeister.com\/folge069\/\">\ud83d\udc7d Reddit | Nr. 69<\/a><\/li>\n<li><a href=\"https:\/\/onlinegeister.com\/folge060\/\">?\ufe0f Datenschutz &amp;#038; Datensicherheit: Die NSA-Aff\u00e4re | Nr. 60<\/a><\/li>\n<\/ul>\n<div style=\"text-align: left;\" align=\"center\">\n<h2><span class=\"ez-toc-section\" id=\"Horen_Download\"><\/span>H\u00f6ren &amp; Download<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Abonniert uns \u00fcber <a href=\"https:\/\/onlinegeister.com\/feed\/\"><strong>RSS<\/strong><\/a>, bei <a href=\"https:\/\/itunes.apple.com\/de\/podcast\/onlinegeister\/id1145611583\"><strong>Apple Podcasts<\/strong><\/a>, <a href=\"https:\/\/open.spotify.com\/show\/40ogXHtfxLusXK5yY2pOY9\">Spotify<\/a>, <a href=\"https:\/\/podcasts.google.com\/?feed=aHR0cDovL29ubGluZWdlaXN0ZXIuY29tL2ZlZWQ%3D&amp;hl=de\">Google Podcasts<\/a> oder einem <a href=\"https:\/\/onlinegeister.com\/abo\">Podcatcher eures Vertrauens<\/a>!<\/li>\n<li>Unterst\u00fctzt uns und <strong><a href=\"https:\/\/www.onlinegeister.com\/hilfe\">bringt euch in die Sendung ein<\/a><\/strong>!<\/li>\n<li>Sorgt f\u00fcr spannendere Themen und <strong><a href=\"mailto:info@onlinegeister.com\">schreibt euer Feedback<\/a><\/strong>!<\/li>\n<li>Oder sprecht <strong><a href=\"https:\/\/onlinegeister.com\/#\">euer Feedback auf unsere Voicemail<\/a><\/strong>!<\/li>\n<\/ul>\n<div align=\"center\"><a href=\"https:\/\/podcasts.apple.com\/de\/podcast\/onlinegeister-radio-c3-bcber-netzkultur-social-media\/id1145611583\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone wp-image-4291 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/onlinegeister-abo-itunes-300x114.png\" alt=\"\" width=\"200\" height=\"76\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/76;\"><\/a> <a href=\"https:\/\/podcasts.google.com\/?feed=aHR0cDovL29ubGluZWdlaXN0ZXIuY29tL2ZlZWQ%3D&amp;hl=de\"><img decoding=\"async\" class=\"alignnone wp-image-4401 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/onlinegeister-abo-buttons-google-podcasts-300x114.png\" alt=\"\" width=\"200\" height=\"76\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/76;\"><\/a> <a href=\"http:\/\/onlinegeister.com\/abo\"><img decoding=\"async\" class=\"alignnone wp-image-2540 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/onlinegeister-abo-300x114.png\" alt=\"\" width=\"200\" height=\"76\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/76;\"><\/a> <a href=\"https:\/\/open.spotify.com\/show\/40ogXHtfxLusXK5yY2pOY9\"><img decoding=\"async\" class=\"alignnone wp-image-4292 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/onlinegeister-abo-spotify-podcast-300x114.png\" alt=\"\" width=\"200\" height=\"76\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/76;\"><\/a> <a href=\"https:\/\/www.amazon.de\/Onlinegeister-DER-Radio-Podcast\/dp\/B07TC33DZJ\"><img decoding=\"async\" class=\"alignnone wp-image-4290 lazyload\" data-src=\"https:\/\/onlinegeister.com\/onlg\/wp-content\/uploads\/onlinegeister-abo-amazon-alexa-flash-briefing-300x114.png\" alt=\"\" width=\"200\" height=\"76\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/76;\"><\/a><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Krieg und Konflikt findet heutzutage auch im Internet statt: In den virtuellen Welten, in denen wir uns so tagt\u00e4glich bei Social Media bewegen, findet nat\u00fcrlich menschliche Interaktion, aber nat\u00fcrlich auch menschlicher Konflikt statt. Deutsche Beh\u00f6rden wie das Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Verfassungsschutz oder auch die Bundeswehr warnen vor einer erh\u00f6hten Gerfahrensituation. Doch&nbsp;&hellip;<\/p>","protected":false},"author":2,"featured_media":1328,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2,17],"tags":[97,11,98],"class_list":["post-2814","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-datenschutz","category-it-sicherheit","tag-cybersicherheit","tag-datenschutz","tag-datensicherheit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Podcasthinweis: Cyberkrieg - DER Datenschutzbeauftragte f\u00fcr Deutschland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Podcasthinweis: Cyberkrieg - DER Datenschutzbeauftragte f\u00fcr Deutschland\" \/>\n<meta property=\"og:description\" content=\"Krieg und Konflikt findet heutzutage auch im Internet statt: In den virtuellen Welten, in denen wir uns so tagt\u00e4glich bei Social Media bewegen, findet nat\u00fcrlich menschliche Interaktion, aber nat\u00fcrlich auch menschlicher Konflikt statt. Deutsche Beh\u00f6rden wie das Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Verfassungsschutz oder auch die Bundeswehr warnen vor einer erh\u00f6hten Gerfahrensituation. Doch&nbsp;&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/\" \/>\n<meta property=\"og:site_name\" content=\"DER Datenschutzbeauftragte f\u00fcr Deutschland\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-24T18:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christian Allner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christian Allner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/\"},\"author\":{\"name\":\"Christian Allner\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#\/schema\/person\/0c2f308b4028d75339da978fc4b77b12\"},\"headline\":\"Podcasthinweis: Cyberkrieg\",\"datePublished\":\"2022-03-24T18:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/\"},\"wordCount\":379,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#organization\"},\"image\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png\",\"keywords\":[\"cybersicherheit\",\"Datenschutz\",\"datensicherheit\"],\"articleSection\":[\"Datenschutz\",\"IT-Sicherheit\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/\",\"url\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/\",\"name\":\"Podcasthinweis: Cyberkrieg - DER Datenschutzbeauftragte f\u00fcr Deutschland\",\"isPartOf\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png\",\"datePublished\":\"2022-03-24T18:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#primaryimage\",\"url\":\"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png\",\"contentUrl\":\"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png\",\"width\":900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/datenschutz-eprivacy.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Podcasthinweis: Cyberkrieg\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#website\",\"url\":\"https:\/\/datenschutz-eprivacy.de\/\",\"name\":\"DER Datenschutzbeauftragte f\u00fcr Deutschland\",\"description\":\"Datenschutz &amp; ePrivacy in Halle (Saale), Magdeburg, Mitteldeutschland und dar\u00fcber hinaus\",\"publisher\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/datenschutz-eprivacy.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#organization\",\"name\":\"DER Datenschutzbeauftragte f\u00fcr Deutschland\",\"url\":\"https:\/\/datenschutz-eprivacy.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/DER_DATENTSCHUTZ_Logo_1000_trans.png\",\"contentUrl\":\"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/DER_DATENTSCHUTZ_Logo_1000_trans.png\",\"width\":1000,\"height\":373,\"caption\":\"DER Datenschutzbeauftragte f\u00fcr Deutschland\"},\"image\":{\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#\/schema\/person\/0c2f308b4028d75339da978fc4b77b12\",\"name\":\"Christian Allner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/datenschutz-eprivacy.de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/72ac811e3c7837373bac3507bad3959ce8d002a74dc2802688e916bb27aff82a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/72ac811e3c7837373bac3507bad3959ce8d002a74dc2802688e916bb27aff82a?s=96&d=mm&r=g\",\"caption\":\"Christian Allner\"},\"description\":\"Externer Datenschutz-Beauftragter in Magdeburg, Erfurt, Halle (Saale) und Leipzig\",\"url\":\"https:\/\/datenschutz-eprivacy.de\/en\/author\/christian-allner\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Podcasthinweis: Cyberkrieg - DER Datenschutzbeauftragte f\u00fcr Deutschland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/","og_locale":"en_GB","og_type":"article","og_title":"Podcasthinweis: Cyberkrieg - DER Datenschutzbeauftragte f\u00fcr Deutschland","og_description":"Krieg und Konflikt findet heutzutage auch im Internet statt: In den virtuellen Welten, in denen wir uns so tagt\u00e4glich bei Social Media bewegen, findet nat\u00fcrlich menschliche Interaktion, aber nat\u00fcrlich auch menschlicher Konflikt statt. Deutsche Beh\u00f6rden wie das Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Verfassungsschutz oder auch die Bundeswehr warnen vor einer erh\u00f6hten Gerfahrensituation. Doch&nbsp;&hellip;","og_url":"https:\/\/datenschutz-eprivacy.de\/en\/cyberkrieg\/","og_site_name":"DER Datenschutzbeauftragte f\u00fcr Deutschland","article_published_time":"2022-03-24T18:00:00+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png","type":"image\/png"}],"author":"Christian Allner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christian Allner","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#article","isPartOf":{"@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/"},"author":{"name":"Christian Allner","@id":"https:\/\/datenschutz-eprivacy.de\/#\/schema\/person\/0c2f308b4028d75339da978fc4b77b12"},"headline":"Podcasthinweis: Cyberkrieg","datePublished":"2022-03-24T18:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/"},"wordCount":379,"commentCount":0,"publisher":{"@id":"https:\/\/datenschutz-eprivacy.de\/#organization"},"image":{"@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#primaryimage"},"thumbnailUrl":"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png","keywords":["cybersicherheit","Datenschutz","datensicherheit"],"articleSection":["Datenschutz","IT-Sicherheit"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/","url":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/","name":"Podcasthinweis: Cyberkrieg - DER Datenschutzbeauftragte f\u00fcr Deutschland","isPartOf":{"@id":"https:\/\/datenschutz-eprivacy.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#primaryimage"},"image":{"@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#primaryimage"},"thumbnailUrl":"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png","datePublished":"2022-03-24T18:00:00+00:00","breadcrumb":{"@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#primaryimage","url":"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png","contentUrl":"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/Onlinegeister-DER-Radio-Podcast-Social-Media-Mittelstand-Podcast.png","width":900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/datenschutz-eprivacy.de\/cyberkrieg\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/datenschutz-eprivacy.de\/"},{"@type":"ListItem","position":2,"name":"Podcasthinweis: Cyberkrieg"}]},{"@type":"WebSite","@id":"https:\/\/datenschutz-eprivacy.de\/#website","url":"https:\/\/datenschutz-eprivacy.de\/","name":"DER Datenschutzbeauftragte f\u00fcr Deutschland","description":"Datenschutz &amp; ePrivacy in Halle (Saale), Magdeburg, Mitteldeutschland und dar\u00fcber hinaus","publisher":{"@id":"https:\/\/datenschutz-eprivacy.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datenschutz-eprivacy.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/datenschutz-eprivacy.de\/#organization","name":"DER Datenschutzbeauftragte f\u00fcr Deutschland","url":"https:\/\/datenschutz-eprivacy.de\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/datenschutz-eprivacy.de\/#\/schema\/logo\/image\/","url":"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/DER_DATENTSCHUTZ_Logo_1000_trans.png","contentUrl":"https:\/\/datenschutz-eprivacy.de\/da\/wp-content\/uploads\/DER_DATENTSCHUTZ_Logo_1000_trans.png","width":1000,"height":373,"caption":"DER Datenschutzbeauftragte f\u00fcr Deutschland"},"image":{"@id":"https:\/\/datenschutz-eprivacy.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/datenschutz-eprivacy.de\/#\/schema\/person\/0c2f308b4028d75339da978fc4b77b12","name":"Christian Allner","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/datenschutz-eprivacy.de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/72ac811e3c7837373bac3507bad3959ce8d002a74dc2802688e916bb27aff82a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72ac811e3c7837373bac3507bad3959ce8d002a74dc2802688e916bb27aff82a?s=96&d=mm&r=g","caption":"Christian Allner"},"description":"Externer Datenschutz-Beauftragter in Magdeburg, Erfurt, Halle (Saale) und Leipzig","url":"https:\/\/datenschutz-eprivacy.de\/en\/author\/christian-allner\/"}]}},"_links":{"self":[{"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/posts\/2814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/comments?post=2814"}],"version-history":[{"count":0,"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/posts\/2814\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/media\/1328"}],"wp:attachment":[{"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/media?parent=2814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/categories?post=2814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datenschutz-eprivacy.de\/en\/wp-json\/wp\/v2\/tags?post=2814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}