{"id":12,"date":"2024-10-24T17:21:00","date_gmt":"2024-10-24T17:21:00","guid":{"rendered":"https:\/\/deltacontrols.wpenginepowered.com\/?page_id=12"},"modified":"2025-07-21T10:22:56","modified_gmt":"2025-07-21T17:22:56","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/dev.deltacontrols.com\/de\/programs-services\/cybersecurity\/","title":{"rendered":"Cybersicherheit"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"12\" class=\"elementor elementor-12\" data-elementor-post-type=\"page\">\n\t\t\t\t<section class=\"elementor-element elementor-element-07ac068 e-flex e-con-boxed e-con e-parent\" data-id=\"07ac068\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-c179522 e-flex e-con-boxed e-con e-parent\" data-id=\"c179522\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2537ae6 e-con-full e-flex e-con e-child\" data-id=\"2537ae6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9480aae elementor-widget elementor-widget-heading\" data-id=\"9480aae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Delta Controls Programm zur Cybersicherheit\u200b\u200b\u200b\u200b\u200b\u200b\u200b<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ab5ac4 e-con-full e-flex e-con e-child\" data-id=\"5ab5ac4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ef71dd elementor-widget elementor-widget-text-editor\" data-id=\"5ef71dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Delta Controls hat sich stets darauf konzentriert, L\u00f6sungen bereitzustellen, die innovativ, reaktionsschnell und einfach zu implementieren sind, und unser Programm zur Cybersicherheit ist keine Ausnahme.<\/p><p>Die Geb\u00e4udesteuerungssysteme von heute sind viel st\u00e4rker miteinander verbunden, und wir k\u00f6nnen in Zukunft mit einer noch gr\u00f6\u00dferen Konnektivit\u00e4t rechnen, da immer mehr Internetger\u00e4te online gehen. Gleichzeitig steigt das Risiko, Schwachstellen und Bedrohungen ausgesetzt zu sein.<\/p><p>Durch Industriestandards wie OWASP, ISO und NIST verf\u00fcgt Delta Controls \u00fcber die Richtlinien, Prozesse und Pr\u00fcfungen, die sicherstellen, dass wir sichere Produkte liefern. Wir sind bestrebt sicherzustellen, dass Geb\u00e4udenetzwerke durch Best Practices f\u00fcr die IT-Integration, st\u00e4ndige Produktbewertungen und zeitnahe Sicherheitsupdates gesch\u00fctzt bleiben.<\/p><p>Unsere Cybersicherheits-Teams von Delta Controls helfen Ihnen bei der Navigation der Sicherheitsschwachstellen und -herausforderungen, mit denen wir t\u00e4glich konfrontiert sind. Nachfolgend erfahren Sie, wie Sie sich \u00fcber unser Programm zur Cybersicherheit informieren und daran teilnehmen k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-f89debd e-flex e-con-boxed e-con e-parent\" data-id=\"f89debd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a2814e9 e-con-full e-flex e-con e-child\" data-id=\"a2814e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c700873 elementor-widget elementor-widget-heading\" data-id=\"c700873\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mission und Vision f\u00fcr die Cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5ecab6 e-con-full e-flex e-con e-child\" data-id=\"d5ecab6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a844297 elementor-widget elementor-widget-text-editor\" data-id=\"a844297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mission Statement<\/strong><\/p><p>Verwaltung der Sicherheit von Kundeninformationen, Mitarbeiterdaten, geistigem Eigentum und anderen Verm\u00f6genswerten, die alle Bereiche von Delta Controls unterst\u00fctzen, und effiziente Entsch\u00e4rfung aller Versuche von Cyberangriffen ohne Datenverlust.<\/p><p><strong>Vision Statement<\/strong><\/p><p>Eine sichere Informationsinfrastruktur, die technologische Innovationen anregt und Wachstum ohne Ausfallzeiten f\u00f6rdert.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-1b82e1b e-flex e-con-boxed e-con e-parent\" data-id=\"1b82e1b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f1ee67 elementor-widget elementor-widget-heading\" data-id=\"2f1ee67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Technologiegetriebene L\u00f6sungen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<section class=\"elementor-element elementor-element-c1af91d e-flex e-con-boxed e-con e-parent\" data-id=\"c1af91d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fd0aef8 e-con-full e-flex e-con e-child\" data-id=\"fd0aef8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5cb9d9 elementor-widget elementor-widget-heading\" data-id=\"f5cb9d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Delta Controls Lebenszyklus der sicheren Softwareentwicklung <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b9e078 e-con-full e-flex e-con e-child\" data-id=\"5b9e078\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-457fe19 e-con-full e-flex e-con e-child\" data-id=\"457fe19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4ef1ad elementor-widget elementor-widget-image\" data-id=\"f4ef1ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"337\" height=\"424\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon.jpg\" class=\"attachment-full size-full wp-image-207\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon.jpg 337w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon-238x300.jpg 238w\" sizes=\"(max-width: 337px) 100vw, 337px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-665e2cc e-con-full e-flex e-con e-child\" data-id=\"665e2cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-455cfcd text-list elementor-widget elementor-widget-text-editor\" data-id=\"455cfcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unser Entwicklungsteam bei Delta Controls erstellt Produkte in einer sicheren Entwicklungsumgebung, die auf Standards und Best Practices der Cybersicherheit basiert. Wie unser Qualit\u00e4tsprogramm bauen wir in jeder Phase Cybersicherheit in unsere Produkte ein. Sicherheit ist unsere oberste Priorit\u00e4t, von der Konzeption bis zur Freigabe.<\/p><ul><li>Ein engagiertes Team f\u00fcr die Produktentwicklungssicherheit<\/li><li>Regelm\u00e4\u00dfige Peer-Reviews f\u00fcr g\u00e4ngige Sicherheitsschwachstellen in der Codierung<\/li><li>Sicherheit, die in die Produktanforderungen einbezogen wird<\/li><li>Produktsicherheitspr\u00fcfungen mit den neuesten Tools und Techniken<\/li><li>Entwicklung von Produkten auf der neuesten, sicheren Software von Drittanbietern<\/li><li>Beschleunigte Bearbeitungszeit f\u00fcr gemeldete Sicherheitsschwachstellen<\/li><li>Best Practices f\u00fcr sichere Code-Basis und Repositorys<\/li><li>Richtlinien zur Produkth\u00e4rtung<\/li><li>Best Practices basierend auf OWASP, ISO 27002 und IEC 62443 4-1<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-ba981df e-flex e-con-boxed e-con e-parent\" data-id=\"ba981df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ec0ddd8 e-con-full e-flex e-con e-child\" data-id=\"ec0ddd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67293e6 elementor-widget elementor-widget-heading\" data-id=\"67293e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Delta Controls \u2013 Sicherheitshinweise<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6b71b3 elementor-widget elementor-widget-text-editor\" data-id=\"a6b71b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kommunikation und Informationsaustausch sind ein wesentlicher Bestandteil unseres Programms zur Cybersicherheit. Delta Controls bietet die folgenden Produkthinweise, mit denen Sie die Sicherheitsrisiken f\u00fcr Ihre Standorte verwalten und angehen k\u00f6nnen.<\/p><p>Delta Controls \u00fcberwacht und meldet Cybersicherheitsbedrohungen, damit unsere Kunden proaktiv die erforderlichen Ma\u00dfnahmen zur Schadensbegrenzung ergreifen oder mit dem Partner in Ihrer N\u00e4he zusammenarbeiten k\u00f6nnen, um die Sicherheit Ihres Geb\u00e4udenetzwerks zu gew\u00e4hrleisten.<\/p><p>Es ist wichtig, diese Warnungen zu \u00fcberwachen und die erforderlichen Ma\u00dfnahmen zu ergreifen, um sicherzustellen, dass Ihre Standorte so sicher wie m\u00f6glich bleiben. Cybersicherheit ist die Verantwortung aller. Unser Cybersicherheits-Team und Ihr \u00f6rtlicher Partner von Delta Controls helfen Ihnen gerne bei Ihren Sicherheitsherausforderungen und -bedenken.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58d7271 e-con-full e-flex e-con e-child\" data-id=\"58d7271\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bfc941b e-con-full e-flex e-con e-child\" data-id=\"bfc941b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1888bdb elementor-align-justify main-btn elementor-widget elementor-widget-button\" data-id=\"1888bdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjMyMzA5IiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Nachrichten zur Cybersicherheit abonnieren<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bfd1600 e-con-full e-flex e-con e-child\" data-id=\"bfd1600\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-661cdac elementor-widget elementor-widget-image\" data-id=\"661cdac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"72\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo.png\" class=\"attachment-large size-large wp-image-206\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo.png 400w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo-300x54.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f46e17d e-con-full e-flex e-con e-child\" data-id=\"f46e17d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2289343 elementor-align-justify main-btn elementor-widget elementor-widget-button\" data-id=\"2289343\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/dev.deltacontrols.com\/de\/vulnerability-reporting-and-handling\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Schwachstelle melden<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-2d46dd1 e-flex e-con-boxed e-con e-parent\" data-id=\"2d46dd1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-151c6b9 e-con-full e-flex e-con e-child\" data-id=\"151c6b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3657aa1 elementor-widget elementor-widget-heading\" data-id=\"3657aa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sicherheitsbulletin f\u00fcr Produkte von Delta Controls<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a82f01 e-con-full e-flex e-con e-child\" data-id=\"1a82f01\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e6142f elementor-widget elementor-widget-shortcode\" data-id=\"9e6142f\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"responsive-1\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Datum<\/th><th class=\"column-2\">Number<\/th><th class=\"column-3\">Produkt<\/th><th class=\"column-4\">Beschreibung<\/th><th class=\"column-5\">Anhang<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">12. Juli 2025<\/td><td class=\"column-2\">SecB0013<\/td><td class=\"column-3\">enteliWEB (nicht betroffen)<\/td><td class=\"column-4\">CVE-2024-21147 ist eine schwerwiegende Schwachstelle (CVSS 7.4), die die Java HotSpot Virtual Machine in Oracle Java und kompatible Distributionen wie Amazon Corretto betrifft. Diese Schwachstelle kann es Angreifern unter bestimmten Bedingungen, die unsichere Deserialisierung oder die Verarbeitung fehlerhafter Eingaben beinhalten, erm\u00f6glichen, Java-basierte Anwendungen zu kompromittieren.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0013_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">22. Mai 2025<\/td><td class=\"column-2\">SecB0012<\/td><td class=\"column-3\">Niagara Framework, Niagara Enterprise Security<\/td><td class=\"column-4\">Aktualisieren Sie Ihre Niagara Software, um mehrere Sicherheitsl\u00fccken, die im Niagara Framework \u00ae identifiziert wurden, zu beheben<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0012_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">27. Januar 2025<\/td><td class=\"column-2\">SecB0011<\/td><td class=\"column-3\">enteliWEB<\/td><td class=\"column-4\">Wenn Sie mit Google Chrome zu enteliWEB navigieren, wird einigen Benutzern eine \u201eGef\u00e4hrliche Website\u201c-Warnseite angezeigt.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0011_Google-Dangerous-Sites-Security-Bulletin-.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">14. Juni 2024<\/td><td class=\"column-2\">SecB0010<\/td><td class=\"column-3\">enteliWEB<\/td><td class=\"column-4\">In PHP-Versionen vor 3.5 kann es bei der Verwendung von Apache und PHP-CGI unter Windows vorkommen, dass Windows das \u201eBest-Fit\u201c-Verhalten verwendet, um Zeichen in der Befehlszeile zu ersetzen, die an WinHI-API-Funktionen \u00fcbergeben werden, wenn das System f\u00fcr die Verwendung bestimmter Codepages eingerichtet ist. Das PHP-CGI-Modul kann diese Zeichen f\u00e4lschlicherweise als PHP-Optionen interpretieren, was es einem b\u00f6swilligen Benutzer erm\u00f6glichen kann, Optionen an ein ausgef\u00fchrtes PHP-Binary zu \u00fcbergeben und so den Quellcode von Skripten offenzulegen, beliebigen PHP-Code auf dem Server auszuf\u00fchren usw.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0010_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">22. Januar 2024<\/td><td class=\"column-2\">SecB0009<\/td><td class=\"column-3\">Niagara Tridium<\/td><td class=\"column-4\">Das Niagara Framework\u00ae wurde aktualisiert, um eine Schwachstelle in der von jxBrowser genutzten libwebp-Komponente zu beheben. <\/td><td class=\"column-5\"><a class=\"download-link\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0009_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">31. Okt. 2023<\/td><td class=\"column-2\">SecB0008<\/td><td class=\"column-3\">enteliSYNC<\/td><td class=\"column-4\">Ein Fehler wurde in PostgreSQL-Versionen vor 13.1, vor 12.5, vor 11.10, vor 10.15, vor 9.6.20 und vor 9.5.24 gefunden.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0008_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">16. Okt. 2023<\/td><td class=\"column-2\">SecB0007<\/td><td class=\"column-3\">enteliCLOUD<\/td><td class=\"column-4\">Ein Anbieter von L\u00f6sungen zur Bedrohungsanalyse und -abwehr hat enteliCLOUD.com f\u00e4lschlicherweise als Phishing-Bedrohung identifiziert.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0007_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">2022. November 16<\/td><td class=\"column-2\">SecB0006<\/td><td class=\"column-3\">Open SSL Ver. 3.0.0-3.0.6<\/td><td class=\"column-4\">CVE-2022-3786 UND CVE-2022-3602<\/td><td class=\"column-5\"><a class=\"download-link\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0006_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">February 3, 2022<\/td><td class=\"column-2\">SecB005<\/td><td class=\"column-3\">CopperCube<\/td><td class=\"column-4\">CVE-2021-4034 Polkits pkexec-Utility-Schwachstelle<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0005_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">21. Januar 2020<\/td><td class=\"column-2\">SecB003<\/td><td class=\"column-3\">enteliWEB version 4.13<\/td><td class=\"column-4\">Enth\u00e4lt eine Schwachstelle bei der Dateipfad\u00fcberquerung, die es authentifizierten enteliWEB-Benutzern erm\u00f6glicht, auf Dateien auf dem Server zuzugreifen<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0003_Security_Bulletin-enteliWEB-File-path.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">10. September 2019<\/td><td class=\"column-2\">SecB002<\/td><td class=\"column-3\">Delta N4 Workbench and Supervisor Delta JACE Controller<br \/>\nDelta JACE controllers<\/td><td class=\"column-4\">Niagara JACE, Edge 10 QNX Schwachstellen<\/td><td class=\"column-5\"><a class=\"download-link\"  target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0002_Security_Bulletin-Tridium.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">18. Juli 2019<\/td><td class=\"column-2\">SecB001<\/td><td class=\"column-3\">enteliBUS\t<\/td><td class=\"column-4\">enteliBUS-Controller mit der Firmware 3.40 R5 von 571848 oder fr\u00fcheren Versionen haben eine Schwachstelle beim Puffer\u00fcberlauf, durch die eine Fernausf\u00fchrung m\u00f6glich ist<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0001_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-1 from cache --><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82f8fe9 e-con-full e-flex e-con e-child\" data-id=\"82f8fe9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<section class=\"elementor-element elementor-element-2ad72c8 e-con-full e-flex e-con e-child\" data-id=\"2ad72c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7368978 e-con-full e-flex e-con e-child\" data-id=\"7368978\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53588e1 elementor-widget elementor-widget-heading\" data-id=\"53588e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersicherheit neu<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edfdb99 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient load-more-align-center elementor-widget elementor-widget-posts\" data-id=\"edfdb99\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;pagination_type&quot;:&quot;load_more_on_click&quot;,&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;load_more_spinner&quot;:{&quot;value&quot;:&quot;fas fa-spinner&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-32300 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"644\" height=\"401\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1.png\" class=\"attachment-medium_large size-medium_large wp-image-22\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1.png 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1-300x187.png 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" >\n\t\t\t\tApache Foundation Log4j 2 Schwachstelle (CVE-2021-44228)\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" aria-label=\"Mehr \u00fcber Apache Foundation Log4j 2 Vulnerability (CVE-2021-44228)\" tabindex=\"-1\" >\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDezember 14, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-18885 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-general\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/general\/dci-care-packages\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31898\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/general\/dci-care-packages\/\" >\n\t\t\t\tDelta Controls Care-Pakete \u2013 Richtig gemacht ist besser\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/general\/dci-care-packages\/\" aria-label=\"Mehr \u00fcber Delta Controls Care Packages- Doing It Right\" tabindex=\"-1\" >\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t13. April 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-18421 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-featured\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31899\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" >\n\t\t\t\tRobert Hemmerdinger auf IoT For All vorgestellt\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" aria-label=\"Mehr \u00fcber Robert Hemmerdinger featured on IoT For All\" tabindex=\"-1\" >\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tM\u00e4rz 16, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-17056 post type-post status-publish format-standard has-post-thumbnail hentry category-awards category-cybersecurity category-events\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/awards\/cv-magazine-awards-2020\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31902\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/awards\/cv-magazine-awards-2020\/\" >\n\t\t\t\tBestes Unternehmen f\u00fcr gewerbliche Geb\u00e4udeautomationssysteme 2020\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/awards\/cv-magazine-awards-2020\/\" aria-label=\"Mehr \u00fcber Best Commercial Building Automation Systems Company 2020\" tabindex=\"-1\" >\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuar 5, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-31855 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-general category-updates\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/general\/o3-sensor-us-patent-approva\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"571\" height=\"321\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31856\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover.jpg 571w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover-300x169.jpg 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/general\/o3-sensor-us-patent-approva\/\" >\n\t\t\t\tDie Bedeutung der US-Patentzulassung unseres preisgekr\u00f6nten O3-Sensors\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/general\/o3-sensor-us-patent-approva\/\" aria-label=\"Mehr \u00fcber The Significance of Our Award-Winning O3 Sensor\u2019s US Patent Approval\" tabindex=\"-1\" >\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDezember 14, 2020\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16872 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-updates\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/updates\/automatedbuildings-vcon\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"401\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER.jpg\" class=\"attachment-medium_large size-medium_large wp-image-32179\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER-300x187.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/updates\/automatedbuildings-vcon\/\" >\n\t\t\t\tAutomatedBuildings.com Fragen und Antworten mit Delta Controls\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/de\/news-events\/updates\/automatedbuildings-vcon\/\" aria-label=\"Mehr \u00fcber AutomatedBuildings.com Q&#038;A with Delta Controls\" tabindex=\"-1\" >\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDezember 1, 2020\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t<span class=\"e-load-more-spinner\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-spinner\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M304 48c0 26.51-21.49 48-48 48s-48-21.49-48-48 21.49-48 48-48 48 21.49 48 48zm-48 368c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.49-48-48-48zm208-208c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.49-48-48-48zM96 256c0-26.51-21.49-48-48-48S0 229.49 0 256s21.49 48 48 48 48-21.49 48-48zm12.922 99.078c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48c0-26.509-21.491-48-48-48zm294.156 0c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48c0-26.509-21.49-48-48-48zM108.922 60.922c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.491-48-48-48z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\n\t\t\t\t<div class=\"e-load-more-anchor\" data-page=\"1\" data-max-page=\"4\" data-next-page=\"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/pages\/12\/page\/2\/\"><\/div>\n\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr laden<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<div class=\"e-load-more-message\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Delta Controls Cybersecurity Program Delta Controls has always focused our efforts on providing solutions that are innovative, responsive, and easy to implement, and our cybersecurity program is no different. The<\/p>","protected":false},"author":1,"featured_media":209,"parent":31400,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-12","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity | Delta Controls<\/title>\n<meta name=\"description\" content=\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.deltacontrols.com\/de\/programs-services\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.deltacontrols.com\/de\/programs-services\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Delta Intelligent Building Technologies (Canada) Inc.\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-21T17:22:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2249\" \/>\n\t<meta property=\"og:image:height\" content=\"555\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@deltacontrols\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity | Delta Controls\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"datePublished\":\"2024-10-24T17:21:00+00:00\",\"dateModified\":\"2025-07-21T17:22:56+00:00\",\"description\":\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"contentUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"width\":2249,\"height\":555},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programs &#038; Services\",\"item\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#website\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\",\"name\":\"Delta Intelligent Building Technologies (Canada) Inc.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dev.deltacontrols.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#organization\",\"name\":\"Delta Intelligent Building Technologies (Canada) Inc.\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png\",\"contentUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png\",\"width\":1124,\"height\":542,\"caption\":\"Delta Intelligent Building Technologies (Canada) Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/deltacontrols\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/delta-controls\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity | Delta Controls","description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.deltacontrols.com\/de\/programs-services\/cybersecurity\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersecurity","og_description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","og_url":"https:\/\/dev.deltacontrols.com\/de\/programs-services\/cybersecurity\/","og_site_name":"Delta Intelligent Building Technologies (Canada) Inc.","article_modified_time":"2025-07-21T17:22:56+00:00","og_image":[{"width":2249,"height":555,"url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@deltacontrols","twitter_misc":{"Est. reading time":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/","url":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/","name":"Cybersecurity | Delta Controls","isPartOf":{"@id":"https:\/\/dev.deltacontrols.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","datePublished":"2024-10-24T17:21:00+00:00","dateModified":"2025-07-21T17:22:56+00:00","description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","breadcrumb":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage","url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","contentUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","width":2249,"height":555},{"@type":"BreadcrumbList","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.deltacontrols.com\/"},{"@type":"ListItem","position":2,"name":"Programs &#038; Services","item":"https:\/\/dev.deltacontrols.com\/programs-services\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/dev.deltacontrols.com\/#website","url":"https:\/\/dev.deltacontrols.com\/","name":"Delta Intelligent Building Technologies (Canada) Inc.","description":"","publisher":{"@id":"https:\/\/dev.deltacontrols.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.deltacontrols.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/dev.deltacontrols.com\/#organization","name":"Delta Intelligent Building Technologies (Canada) Inc.","url":"https:\/\/dev.deltacontrols.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/dev.deltacontrols.com\/#\/schema\/logo\/image\/","url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png","contentUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png","width":1124,"height":542,"caption":"Delta Intelligent Building Technologies (Canada) Inc."},"image":{"@id":"https:\/\/dev.deltacontrols.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/deltacontrols","https:\/\/www.linkedin.com\/company\/delta-controls"]}]}},"featured_image_src":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner-600x400.jpg","featured_image_src_square":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner-600x555.jpg","_links":{"self":[{"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":0,"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/pages\/31400"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/media\/209"}],"wp:attachment":[{"href":"https:\/\/dev.deltacontrols.com\/de\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}