{"id":3030,"date":"2024-09-05T11:48:53","date_gmt":"2024-09-05T09:48:53","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=3030"},"modified":"2024-09-05T11:50:12","modified_gmt":"2024-09-05T09:50:12","slug":"certitude-expert-guest-on-university-of-vienna-podcast","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/certitude-expert-guest-on-university-of-vienna-podcast\/","title":{"rendered":"Certitude expert guest on University of Vienna Podcast"},"content":{"rendered":"\n<p>Florian Schweitzer, IT-security expert at Certitude Consulting, was a guest on the Ars Boni podcast episode 520 on IT security threats, online Trojans and messenger monitoring and explained how exploit trading works as well as the difficulties in implementing the often discussed messenger monitoring by security services.<\/p>\n\n\n\n<p>The episode of the podcast is available as a video on YouTube or as a podcast via Spotify and Co.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Ars Boni 520 IT-Security Threats, Onlinetrojaner und Messenger\u00fcberwachung\" width=\"960\" height=\"540\" src=\"https:\/\/www.youtube.com\/embed\/jcNHtkJm8qk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Florian Schweitzer, IT-security expert at Certitude Consulting, was a guest on the Ars Boni podcast episode 520 on IT security threats, online Trojans and messenger monitoring and explained how exploit trading works as well as the difficulties in implementing the often discussed messenger monitoring by security services. The episode of the podcast is available as [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3029,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[128],"tags":[591,594,597],"class_list":["post-3030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press","tag-exploits-en","tag-podcast-en","tag-politics-en"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=3030"}],"version-history":[{"count":4,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3030\/revisions"}],"predecessor-version":[{"id":3037,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3030\/revisions\/3037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/3029"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=3030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=3030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=3030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}