{


"https://www.schutzwerk.com/en/blog/": [
    "/en/43/index.html",
    "/en/42/Current-News.html",
    "/en/42/Aktuelle-Meldungen,10,1.html",
    "/en/42/Aktuelle-Meldungen,11,1.html",
    "/en/42/Aktuelle-Meldungen,1,1.html",
    "/en/42/Aktuelle-Meldungen,2,1.html",
    "/en/42/Aktuelle-Meldungen,3,1.html",
    "/en/42/Aktuelle-Meldungen,4,1.html",
    "/en/42/Aktuelle-Meldungen,5,1.html",
    "/en/42/Aktuelle-Meldungen,6,1.html",
    "/en/42/Aktuelle-Meldungen,7,1.html",
    "/en/42/Aktuelle-Meldungen,8,1.html",
    "/en/42/Aktuelle-Meldungen,9,1.html"
     
],



"https://www.schutzwerk.com/en/blog/differential-cryptanalysis-2/": [
    "/de/43/posts/differential_cryptanalysis_2/",
    "/en/43/posts/differential_cryptanalysis_2/"
     
],



"https://www.schutzwerk.com/en/blog/secure-our-streets-conference-2022/": [
    "/en/74/Secure-Our-Streets-Conference,1,1,127.html"
     
],



"https://www.schutzwerk.com/en/blog/schutzwerk-ist-iso27001-iso9001-und-tisax-zertifiziert/": [
    "/en/74/SCHUTZWERK-is-ISO-27001-ISO-9001-and-TISAX-certified,1,1,126.html"
     
],



"https://www.schutzwerk.com/en/blog/proboter-03/": [
    "/en/43/posts/proboter_03/",
    "/de/43/posts/proboter_03/"
     
],



"https://www.schutzwerk.com/en/blog/schutzwerk-sa-2022-003/": [
    "/en/43/advisories/schutzwerk-sa-2022-003/",
    "/de/43/advisories/schutzwerk-sa-2022-003/",
    "/advisories/schutzwerk-sa-2022-003/"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-cgroups-04-groups-kernel/": [
    "/en/43/posts/control_04_groups_kernel/",
    "/de/43/posts/control_04_groups_kernel/"
     
],



"https://www.schutzwerk.com/en/blog/talk-about-phishing-attacks-at-10th-ulm-logistics-day/": [
    "/en/74/Talk-about-phishing-attacks,1,1,125.html"
     
],



"https://www.schutzwerk.com/en/blog/bsides-munich-onsite-again/": [
    "/en/74/BSides-Munich-onsite-again,1,1,124.html"
     
],



"https://www.schutzwerk.com/en/blog/interview-for-newspaper-regarding-data-leakage-at-legoland/": [
    "/en/74/SCHUTZWERK-gives-an-interview-for-the-newspaper-regarding-the-data-leakage-at-Legoland,1,1,123.html"
     
],



"https://www.schutzwerk.com/en/blog/proboter-video/": [
    "/en/43/posts/proboter-video/",
    "/de/43/posts/proboter-video/"
     
],



"https://www.schutzwerk.com/en/blog/proboter-02/": [
    "/en/43/posts/proboter_02/",
    "/de/43/posts/proboter_02/"
     
],



"https://www.schutzwerk.com/en/blog/embedded-security-assessment-of-a-telechips-soc/": [
    "/de/43/posts/telechips/",
    "/en/43/posts/telechips/"
     
],



"https://www.schutzwerk.com/en/blog/statistical-modelling-of-timing-sidechannels/": [
    "/en/43/posts/statistical_modelling_of_timing_sidechannels/",
    "/de/43/posts/statistical_modelling_of_timing_sidechannels/"
     
],



"https://www.schutzwerk.com/en/blog/escar21/": [
    "/en/43/posts/escar21/",
    "/de/43/posts/escar21/"
     
],



"https://www.schutzwerk.com/en/blog/schutzwerk-ist-neon-sponsor/": [
    "/en/74/SCHUTZWERK-is-NEON-sponsor,2,1,121.html"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-cgroups-03-memory-cpu-freezer-dev/": [
    "/en/43/posts/control_groups_03_memory_cpu_freezer_dev/",
    "/de/43/posts/control_groups_03_memory_cpu_freezer_dev/"
     
],



"https://www.schutzwerk.com/en/blog/differential-cryptanalysis-1/": [
    "/de/43/posts/differential_cryptanalysis_1/",
    "/en/43/posts/differential_cryptanalysis_1/"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-cgroups-02-network-block-io/": [
    "/en/43/posts/control_groups_02_network_block_io/",
    "/de/43/posts/control_groups_02_network_block_io/"
     
],



"https://www.schutzwerk.com/en/blog/methodology-iot-healthcare-devices-01/": [
    "/en/43/posts/methodology-iot-healthcare-devices_01/"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-cgroups-01-intro/": [
    "/en/43/posts/cgroups_01_intro/",
    "/de/43/posts/cgroups_01_intro/"
     
],



"https://www.schutzwerk.com/en/blog/proboter-01/": [
    "/en/43/posts/proboter_01/",
    "/de/43/posts/proboter_01/"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-namespaces05-kernel/": [
    "/en/43/posts/namespaces_05_kernel/",
    "/de/43/posts/namespaces_05_kernel/"
     
],



"https://www.schutzwerk.com/en/blog/attacking-a-rng/": [
    "/de/43/posts/attacking_a_random_number_generator/",
    "/en/43/posts/attacking_a_random_number_generator/"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-namespaces04-user/": [
    "/en/43/posts/namespaces_04_user/",
    "/de/43/posts/namespaces_04_user/"
     
],



"https://www.schutzwerk.com/en/blog/poweranalysis02/": [
    "/en/43/posts/poweranalysis_2/",
    "/de/43/posts/poweranalysis_2/"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-namespaces03-pid-net/": [
    "/en/43/posts/namespaces_03_pid_net/",
    "/de/43/posts/namespaces_03_pid_net/"
     
],



"https://www.schutzwerk.com/en/blog/sd-wan/": [
    "/en/43/posts/sd-wan/",
    "/de/43/posts/sd-wan/"
     
],



"https://www.schutzwerk.com/en/blog/home-office-covid-19/": [
    "/en/74/Home-office-and-IT-security-in-times-of-COVID-19,2,1,120.html"
     
],



"https://www.schutzwerk.com/en/blog/covid19malware/": [
    "/de/43/posts/covid19malware/",
    "/en/43/posts/covid19malware/"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-namespaces02-mnt/": [
    "/en/43/posts/namespaces_02_mnt/",
    "/de/43/posts/namespaces_02_mnt/"
     
],



"https://www.schutzwerk.com/en/blog/azuregenerat0r/": [
    "/de/43/posts/azuregenerat0r/",
    "/en/43/posts/azuregenerat0r/"
     
],



"https://www.schutzwerk.com/en/blog/11-german-owasp-day/": [
    "/en/74/SCHUTZWERK-IS-SPONSOR-OF-THE-11TH-GOD,2,1,118.html"
     
],



"https://www.schutzwerk.com/en/blog/hochschulkooperation-im-norden/": [
    "/en/74/SCHUTZWERK-COOPERATES-WITH-THE-WEDELER-UNIVERSITY-ASSOCIATION,3,1,117.html"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-namespaces01-intro/": [
    "/en/43/posts/namespaces_01_intro/",
    "/de/43/posts/namespaces_01_intro/"
     
],



"https://www.schutzwerk.com/en/blog/sponsor-elbsides/": [
    "/en/74/SCHUTZWERK-IS-SILVER-SPONSOR-OF-ELBSIDES,3,1,115.html"
     
],



"https://www.schutzwerk.com/en/blog/poweranalysis01/": [
    "/en/43/posts/poweranalysis_1/",
    "/de/43/posts/poweranalysis_1/"
     
],



"https://www.schutzwerk.com/en/blog/neues-buero-hamburg/": [
    "/en/74/Moin-moin-New-office-in-the-heart-of-Hamburg,3,1,114.html"
     
],



"https://www.schutzwerk.com/en/blog/vortrag-hs-aalen-2019/": [
    "/en/74/Automotive-Security-Talk-at-Aalen-University,3,1,113.html"
     
],



"https://www.schutzwerk.com/en/blog/ctf-hs-aalen-2019/": [
    "/en/74/SCHUTZWERK-CTF-Event-at-the-Aalen-University-of-Applied-Sciences,3,1,112.html"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-capabilities/": [
    "/en/43/posts/linux_container_capabilities/",
    "/de/43/posts/linux_container_capabilities/"
     
],



"https://www.schutzwerk.com/en/blog/linux-container-intro/": [
    "/en/43/posts/linux_container_intro/",
    "/de/43/posts/linux_container_intro/"
     
],



"https://www.schutzwerk.com/en/blog/pqcrypto/": [
    "/en/43/posts/pqcrypto/",
    "/de/43/posts/pqcrypto/"
     
],



"https://www.schutzwerk.com/en/blog/guestlectures/": [
    "/en/43/posts/guestlectures/",
    "/de/43/posts/guestlectures/"
     
],



"https://www.schutzwerk.com/en/blog/threat-modeling-with-tmte4pt/": [
    "/en/43/posts/tmte4pt/",
    "/de/43/posts/tmte4pt/"
     
],



"https://www.schutzwerk.com/en/blog/machs-gut-2018-hallo-2019/": [
    "/en/74/So-long-2018-Hello-2019,4,1,111.html"
     
],



"https://www.schutzwerk.com/en/blog/schutzwerk-ist-sponsor-des-10-german-owasp-day/": [
    "/en/74/SCHUTZWERK-AT-THE-10TH-GERMAN-OWASP-DAY,4,1,110.html"
     
],



"https://www.schutzwerk.com/en/blog/brucon/": [
    "/de/43/posts/brucon/",
    "/en/43/posts/brucon/"
     
],



"https://www.schutzwerk.com/en/blog/hardweario2018/": [
    "/en/43/posts/hardweario2018/",
    "/de/43/posts/hardweario2018/"
     
],



"https://www.schutzwerk.com/en/blog/hardwear.io-2018/": [
    "/en/74/SCHUTZWERK-sponsors-hardwear-io,4,1,109.html"
     
],



"https://www.schutzwerk.com/en/blog/starke-it-sicherheit-fuer-das-auto-der-zukunft/": [
    "/en/74/Powerful-IT-security-for-the-car-of-the-future,4,1,108.html"
     
],



"https://www.schutzwerk.com/en/blog/canalyzat0r/": [
    "/de/43/posts/canalyzat0r/",
    "/en/43/posts/canalyzat0r/"
     
],



"https://www.schutzwerk.com/en/blog/unser-jahr-2017/": [
    "/en/74/Our-year-2017-Even-closer-to-our-customer,4,1,107.html"
     
],



"https://www.schutzwerk.com/en/blog/9-german-owasp-day/": [
    "/en/74/SCHUTZWERK-AT-THE-9TH-GERMAN-OWASP-DAY,5,1,106.html"
     
],



"https://www.schutzwerk.com/en/blog/it-sa-2017/": [
    "/en/74/CAPTURE-THE-FLAG-FREE-HACKING-WORKSHOP-AT-IT-SA,5,1,105.html"
     
],



"https://www.schutzwerk.com/en/blog/hardwear.io-2017/": [
    "/en/74/SCHUTZWERK-sponsors-hardwear-io,5,1,103.html"
     
],



"https://www.schutzwerk.com/en/blog/uniulm-ctf-2017/": [
    "/en/74/CTF-Training-at-University-of-Ulm,5,1,104.html"
     
],



"https://www.schutzwerk.com/en/blog/naechste-generation-sicherheitsexperten/": [
    "/en/74/The-Next-Generation-of-Security-Experts,5,1,102.html"
     
],



"https://www.schutzwerk.com/en/blog/hacking-workshop-hochschule-aalen/": [
    "/en/74/Hacking-Workshop-at-Hochschule-Aalen,6,1,101.html"
     
],



"https://www.schutzwerk.com/en/blog/neue-trainingsbekleidung-fuer-die-handballer.des-sg-ulm-wiblingen/": [
    "/en/74/New-training-wear-for-the-handballers-of-SG-Ulm-Wiblingen,6,1,100.html"
     
],



"https://www.schutzwerk.com/en/blog/8-hack2improve-2016/": [
    "/en/74/8-FURTWANGENER-HACKING-EVENT-HACK2IMPROVE-2016-WITH-SCHUTZWERK,6,1,99.html"
     
],



"https://www.schutzwerk.com/en/blog/schutzwerk-ist-sponsor-des-8-german-owasp-day/": [
    "/en/74/SCHUTZWERK-AT-THE-8TH-GERMAN-OWASP-DAY,6,1,98.html"
     
],



"https://www.schutzwerk.com/en/blog/vortrag-zum-thema-zielgerichtete-angriffe-auf-das-unternehmensnetzwerk/": [
    "/en/74/Presentation-about-targeted-attacks-on-IT-networks,6,1,97.html"
     
],



"https://www.schutzwerk.com/en/blog/neue-website-strafferes-portfolio-neue-mitarbeiter/": [
    "/en/74/New-website-streamlined-portfolio-new-team-members,7,1,96.html"
     
],



"https://www.schutzwerk.com/en/blog/vortrag-zum-thema-web-security-aus-der-perspektive-eines-penetration-testers/": [
    "/en/74/Presentation-on-Web-Security-from-the-Perspective-of-a-Penetration-Tester,7,1,95.html"
     
],



"https://www.schutzwerk.com/en/blog/covid-19-information/": [
    "/en/74/SCHUTZWERK-COVID-19-Information,2,1,119.html"
     
],


"https://www.schutzwerk.com/blog/": [
    "/de/43/index.html",
    "/de/42/Aktuelle-Meldungen,11,1.html",
    "/de/42/Aktuelle-Meldungen,10,1.html",
    "/de/42/Aktuelle-Meldungen,1,1.html",
    "/de/42/Aktuelle-Meldungen,2,1.html",
    "/de/42/Aktuelle-Meldungen,3,1.html",
    "/de/42/Aktuelle-Meldungen,4,1.html",
    "/de/42/Aktuelle-Meldungen,5,1.html",
    "/de/42/Aktuelle-Meldungen,6,1.html",
    "/de/42/Aktuelle-Meldungen,7,1.html",
    "/de/42/Aktuelle-Meldungen,8,1.html",
    "/de/42/Aktuelle-Meldungen,9,1.html",
    "/de/42/Aktuelle-Meldungen.html"
    
],



"https://www.schutzwerk.com/blog/differential-cryptanalysis-2/": [
    "/de/43/posts/differential_cryptanalysis_2/",
    "/en/43/posts/differential_cryptanalysis_2/"
    
],



"https://www.schutzwerk.com/blog/secure-our-streets-conference-2022/": [
    "/de/74/Secure-Our-Streets-Conference,1,1,127.html"
    
],



"https://www.schutzwerk.com/blog/schutzwerk-ist-iso27001-iso9001-und-tisax-zertifiziert/": [
    "/de/74/SCHUTZWERK-ist-nach-ISO-27001-ISO-9001-und-TISAX-zertifiziert,1,1,126.html"
    
],



"https://www.schutzwerk.com/blog/proboter-03/": [
    "/en/43/posts/proboter_03/",
    "/de/43/posts/proboter_03/"
    
],



"https://www.schutzwerk.com/blog/schutzwerk-sa-2022-003/": [
    "/en/43/advisories/schutzwerk-sa-2022-003/",
    "/de/43/advisories/schutzwerk-sa-2022-003/",
    "/advisories/schutzwerk-sa-2022-003/"
    
],



"https://www.schutzwerk.com/blog/linux-container-cgroups-04-groups-kernel/": [
    "/en/43/posts/control_04_groups_kernel/",
    "/de/43/posts/control_04_groups_kernel/"
    
],



"https://www.schutzwerk.com/blog/talk-about-phishing-attacks-at-10th-ulm-logistics-day/": [
    "/de/74/SCHUTZWERK-haelt-einen-Vortrag-zu-Phishing-Angriffen-auf-dem-10-Ulmer-Logistiktag,1,1,125.html"
    
],



"https://www.schutzwerk.com/blog/bsides-munich-onsite-again/": [
    "/de/74/BSides-Munich-wieder-in-vor-Ort,1,1,124.html"
    
],



"https://www.schutzwerk.com/blog/interview-for-newspaper-regarding-data-leakage-at-legoland/": [
    "/de/74/SCHUTZWERK-im-Zeitungs-Interview-zum-Datenleck-bei-Legoland,1,1,123.html"
    
],



"https://www.schutzwerk.com/blog/proboter-video/": [
    "/en/43/posts/proboter-video/",
    "/de/43/posts/proboter-video/"
    
],



"https://www.schutzwerk.com/blog/proboter-02/": [
    "/en/43/posts/proboter_02/",
    "/de/43/posts/proboter_02/"
    
],



"https://www.schutzwerk.com/blog/embedded-security-assessment-of-a-telechips-soc/": [
    "/de/43/posts/telechips/",
    "/en/43/posts/telechips/"
    
],



"https://www.schutzwerk.com/blog/statistical-modelling-of-timing-sidechannels/": [
    "/en/43/posts/statistical_modelling_of_timing_sidechannels/",
    "/de/43/posts/statistical_modelling_of_timing_sidechannels/"
    
],



"https://www.schutzwerk.com/blog/escar21/": [
    "/en/43/posts/escar21/",
    "/de/43/posts/escar21/"
    
],



"https://www.schutzwerk.com/blog/schutzwerk-ist-neon-sponsor/": [
    "/de/74/SCHUTZWERK-ist-NEON-Sponsor,2,1,121.html"
    
],



"https://www.schutzwerk.com/blog/linux-container-cgroups-03-memory-cpu-freezer-dev/": [
    "/en/43/posts/control_groups_03_memory_cpu_freezer_dev/",
    "/de/43/posts/control_groups_03_memory_cpu_freezer_dev/"
    
],



"https://www.schutzwerk.com/blog/differential-cryptanalysis-1/": [
    "/de/43/posts/differential_cryptanalysis_1/",
    "/en/43/posts/differential_cryptanalysis_1/"
    
],



"https://www.schutzwerk.com/blog/linux-container-cgroups-02-network-block-io/": [
    "/en/43/posts/control_groups_02_network_block_io/",
    "/de/43/posts/control_groups_02_network_block_io/"
    
],



"https://www.schutzwerk.com/blog/methodology-iot-healthcare-devices-01/": [
    "/de/43/posts/methodology-iot-healthcare-devices_01/"
    
],



"https://www.schutzwerk.com/blog/linux-container-cgroups-01-intro/": [
    "/en/43/posts/cgroups_01_intro/",
    "/de/43/posts/cgroups_01_intro/"
    
],



"https://www.schutzwerk.com/blog/proboter-01/": [
    "/en/43/posts/proboter_01/",
    "/de/43/posts/proboter_01/"
    
],



"https://www.schutzwerk.com/blog/linux-container-namespaces05-kernel/": [
    "/en/43/posts/namespaces_05_kernel/",
    "/de/43/posts/namespaces_05_kernel/"
    
],



"https://www.schutzwerk.com/blog/attacking-a-rng/": [
    "/de/43/posts/attacking_a_random_number_generator/",
    "/en/43/posts/attacking_a_random_number_generator/"
    
],



"https://www.schutzwerk.com/blog/linux-container-namespaces04-user/": [
    "/en/43/posts/namespaces_04_user/",
    "/de/43/posts/namespaces_04_user/"
    
],



"https://www.schutzwerk.com/blog/poweranalysis02/": [
    "/en/43/posts/poweranalysis_2/",
    "/de/43/posts/poweranalysis_2/"
    
],



"https://www.schutzwerk.com/blog/linux-container-namespaces03-pid-net/": [
    "/en/43/posts/namespaces_03_pid_net/",
    "/de/43/posts/namespaces_03_pid_net/"
    
],



"https://www.schutzwerk.com/blog/sd-wan/": [
    "/en/43/posts/sd-wan/",
    "/de/43/posts/sd-wan/"
    
],



"https://www.schutzwerk.com/blog/home-office-covid-19/": [
    "/de/74/Home-Office-und-IT-Sicherheit-in-Zeiten-von-COVID-19,2,1,120.html"
    
],



"https://www.schutzwerk.com/blog/covid19malware/": [
    "/de/43/posts/covid19malware/",
    "/en/43/posts/covid19malware/"
    
],



"https://www.schutzwerk.com/blog/linux-container-namespaces02-mnt/": [
    "/en/43/posts/namespaces_02_mnt/",
    "/de/43/posts/namespaces_02_mnt/"
    
],



"https://www.schutzwerk.com/blog/covid-19-information/": [
    "/de/74/SCHUTZWERK-COVID-19-Information,2,1,119.html"
    
],



"https://www.schutzwerk.com/blog/azuregenerat0r/": [
    "/de/43/posts/azuregenerat0r/",
    "/en/43/posts/azuregenerat0r/"
    
],



"https://www.schutzwerk.com/blog/11-german-owasp-day/": [
    "/de/74/SCHUTZWERK-IST-SPONSOR-DES-11-GOD,2,1,118.html"
    
],



"https://www.schutzwerk.com/blog/hochschulkooperation-im-norden/": [
    "/de/74/SCHUTZWERK-KOOPERIERT-MIT-DEM-WEDELER-HOCHSCHULBUND-WHB,3,1,117.html"
    
],



"https://www.schutzwerk.com/blog/linux-container-namespaces01-intro/": [
    "/en/43/posts/namespaces_01_intro/",
    "/de/43/posts/namespaces_01_intro/"
    
],



"https://www.schutzwerk.com/blog/sponsor-elbsides/": [
    "/de/74/SCHUTZWERK-IST-SILVER-SPONSOR-DER-ELBSIDES,3,1,115.html"
    
],



"https://www.schutzwerk.com/blog/poweranalysis01/": [
    "/en/43/posts/poweranalysis_1/",
    "/de/43/posts/poweranalysis_1/"
    
],



"https://www.schutzwerk.com/blog/neues-buero-hamburg/": [
    "/de/74/Moin-moin-Neues-Buero-im-Herzen-von-Hamburg,3,1,114.html"
    
],



"https://www.schutzwerk.com/blog/vortrag-hs-aalen-2019/": [
    "/de/74/Vortrag-zu-Automotive-Security-an-der-HS-Aalen,3,1,113.html"
    
],



"https://www.schutzwerk.com/blog/ctf-hs-aalen-2019/": [
    "/de/74/SCHUTZWERK-CTF-Event-an-der-Hochschule-Aalen,3,1,112.html"
    
],



"https://www.schutzwerk.com/blog/linux-container-capabilities/": [
    "/en/43/posts/linux_container_capabilities/",
    "/de/43/posts/linux_container_capabilities/"
    
],



"https://www.schutzwerk.com/blog/linux-container-intro/": [
    "/en/43/posts/linux_container_intro/",
    "/de/43/posts/linux_container_intro/"
    
],



"https://www.schutzwerk.com/blog/pqcrypto/": [
    "/en/43/posts/pqcrypto/",
    "/de/43/posts/pqcrypto/"
    
],



"https://www.schutzwerk.com/blog/guestlectures/": [
    "/en/43/posts/guestlectures/",
    "/de/43/posts/guestlectures/"
    
],



"https://www.schutzwerk.com/blog/threat-modeling-with-tmte4pt/": [
    "/en/43/posts/tmte4pt/",
    "/de/43/posts/tmte4pt/"
    
],



"https://www.schutzwerk.com/blog/machs-gut-2018-hallo-2019/": [
    "/de/74/Machs-gut-2018-Hallo-2019,4,1,111.html"
    
],



"https://www.schutzwerk.com/blog/schutzwerk-ist-sponsor-des-10-german-owasp-day/": [
    "/de/74/SCHUTZWERK-IST-SPONSOR-DES-10-GERMAN-OWASP-DAY,4,1,110.html"
    
],



"https://www.schutzwerk.com/blog/brucon/": [
    "/de/43/posts/brucon/",
    "/en/43/posts/brucon/"
    
],



"https://www.schutzwerk.com/blog/hardweario2018/": [
    "/en/43/posts/hardweario2018/",
    "/de/43/posts/hardweario2018/"
    
],



"https://www.schutzwerk.com/blog/hardwear.io-2018/": [
    "/de/74/SCHUTZWERK-auf-der-hardwear-io,4,1,109.html"
    
],



"https://www.schutzwerk.com/blog/starke-it-sicherheit-fuer-das-auto-der-zukunft/": [
    "/de/74/Starke-IT-Sicherheit-fuer-das-Auto-der-Zukunft,4,1,108.html"
    
],



"https://www.schutzwerk.com/blog/canalyzat0r/": [
    "/de/43/posts/canalyzat0r/",
    "/en/43/posts/canalyzat0r/"
    
],



"https://www.schutzwerk.com/blog/unser-jahr-2017/": [
    "/de/74/Unser-Jahr-2017-Noch-naeher-beim-Kunden,4,1,107.html"
    
],



"https://www.schutzwerk.com/blog/9-german-owasp-day/": [
    "/de/74/SCHUTZWERK-IST-SPONSOR-DES-9-GERMAN-OWASP-DAY,5,1,106.html"
    
],



"https://www.schutzwerk.com/blog/it-sa-2017/": [
    "/de/74/Capture-the-Flag-Kostenloser-Hacking-Workshop-auf-der-it-sa,5,1,105.html"
    
],



"https://www.schutzwerk.com/blog/hardwear.io-2017/": [
    "/de/74/SCHUTZWERK-ist-Sponsor-der-hardwear-io,5,1,103.html"
    
],



"https://www.schutzwerk.com/blog/uniulm-ctf-2017/": [
    "/de/74/CTF-Training-an-der-Uni-Ulm,5,1,104.html"
    
],



"https://www.schutzwerk.com/blog/naechste-generation-sicherheitsexperten/": [
    "/de/74/Die-naechste-Generation-Sicherheitsexperten,5,1,102.html"
    
],



"https://www.schutzwerk.com/blog/hacking-workshop-hochschule-aalen/": [
    "/de/74/Hacking-Workshop-an-der-Hochschule-Aalen,6,1,101.html"
    
],



"https://www.schutzwerk.com/blog/neue-trainingsbekleidung-fuer-die-handballer.des-sg-ulm-wiblingen/": [
    "/de/74/Neue-Trainingsbekleidung-fuer-die-Handballer-des-SG-Ulm-Wiblingen,6,1,100.html"
    
],



"https://www.schutzwerk.com/blog/8-hack2improve-2016/": [
    "/de/74/8-FURTWANGENER-HACKING-EVENT-HACK2IMPROVE-2016-MIT-SCHUTZWERK,6,1,99.html"
    
],



"https://www.schutzwerk.com/blog/schutzwerk-ist-sponsor-des-8-german-owasp-day/": [
    "/de/74/SCHUTZWERK-IST-SPONSOR-DES-8-GERMAN-OWASP-DAY,6,1,98.html"
    
],



"https://www.schutzwerk.com/blog/vortrag-zum-thema-zielgerichtete-angriffe-auf-das-unternehmensnetzwerk/": [
    "/de/74/Vortrag-zum-Thema-Zielgerichtete-Angriffe-auf-das-Unternehmensnetzwerk,6,1,97.html"
    
],



"https://www.schutzwerk.com/blog/neue-website-strafferes-portfolio-neue-mitarbeiter/": [
    "/de/74/Neue-Website-strafferes-Portfolio-neue-Mitarbeiter,7,1,96.html"
    
],



"https://www.schutzwerk.com/blog/vortrag-zum-thema-web-security-aus-der-perspektive-eines-penetration-testers/": [
    "/de/74/Vortrag-zum-Thema-Web-Security-aus-der-Perspektive-eines-Penetration-Testers,7,1,95.html"
    
],



"https://www.schutzwerk.com/en/vacancies/": [
    "/en/72/Current-Vacancies.html"
     
],
























"https://www.schutzwerk.com/freie-stellen/": [
    "/de/72/Offene-Stellen.html"
    
],

























"https://www.schutzwerk.com/en/certification/": [
    "/en/116/Certification.html"
     
],














"https://www.schutzwerk.com/zertifizierung/": [
    "/de/116/Zertifizierungen.html"
    
],






















"https://www.schutzwerk.com/en/about-us/": [
    "/en/15/About-Us.html",
    "/en/11/Company.html"
     
],


"https://www.schutzwerk.com/wir-ueber-uns/": [
    "/de/15/Wir-ueber-uns.html",
    "/de/11/Unternehmen.html"
    
],









"https://www.schutzwerk.com/en/assessment/": [
    "/en/21/Assessment.html",
    "/en/21/Pruefung.html",
    "/en/12/Services.html"
     
],























"https://www.schutzwerk.com/en/assessment/cloud-security-assessment/": [
    "/en/114/Cloud-Security-Assessment.html"
     
],



"https://www.schutzwerk.com/en/assessment/embedded-security-assessment/": [
    "/en/107/Embedded-Systems-Assessment.html"
     
],



"https://www.schutzwerk.com/en/assessment/endpoint-security-assessment/": [
    "/en/28/Assessment-of-Client-Systems.html"
     
],



"https://www.schutzwerk.com/en/assessment/it-forensics/": [
    "/en/32/IT-Forensics.html"
     
],



"https://www.schutzwerk.com/en/assessment/maturity-level-analysis/": [
    "/en/26/Maturity-Level-Analysis-of-Information-Security.html"
     
],



"https://www.schutzwerk.com/en/assessment/mobile-application-security-assessment/": [
    "/en/25/Mobile-Application-Security-Assessment.html"
     
],



"https://www.schutzwerk.com/en/assessment/penetration-test/": [
    "/en/22/Penetration-Test.html"
     
],









"https://www.schutzwerk.com/en/assessment/social-engineering-assessment/": [
    "/en/29/Social-Engineering.html",
    "/en/77/Social-Engineering-focussed-on-Access-Control.html",
    "/en/78/Social-Engineering-focussed-on-Information-Protection.html"
     
],



"https://www.schutzwerk.com/en/assessment/threat-and-risk-assessment/": [
    "/en/27/IT-Risk-Assessment-according-to-ISO-IEC-27005.html"
     
],



"https://www.schutzwerk.com/en/assessment/vulnerability-analysis/": [
    "/en/23/Vulnerability-Analysis.html"
     
],



"https://www.schutzwerk.com/en/assessment/web-application-security-assessment/": [
    "/en/24/Web-Application-Security-Assessment.html"
     
],


"https://www.schutzwerk.com/pruefung/": [
    "/de/21/Pruefung.html",
    "/de/12/Leistungen.html"
    
],

























"https://www.schutzwerk.com/pruefung/bedrohungs-und-risikoanalyse/": [
    "/de/27/IT-Risikoassessment-nach-ISO-IEC-27005.html"
    
],



"https://www.schutzwerk.com/pruefung/cloud-security-assessment/": [
    "/de/114/Cloud-Security-Assessment.html"
    
],



"https://www.schutzwerk.com/pruefung/embedded-security-assessment/": [
    "/de/107/Embedded-Systems-Assessment.html"
    
],



"https://www.schutzwerk.com/pruefung/endpoint-security-assessment/": [
    "/de/28/Pruefung-Client-Systeme.html"
    
],



"https://www.schutzwerk.com/pruefung/it-forensik/": [
    "/de/32/IT-Forensik.html"
    
],



"https://www.schutzwerk.com/pruefung/mobile-application-security-assessment/": [
    "/de/25/Mobile-Application-Security-Assessment.html"
    
],



"https://www.schutzwerk.com/pruefung/penetrationstest/": [
    "/de/22/Penetrationstest.html"
    
],







"https://www.schutzwerk.com/pruefung/reifegradanalyse-der-informationssicherheit/": [
    "/de/26/Reifegradanalyse-Informationssicherheit.html"
    
],



"https://www.schutzwerk.com/pruefung/schwachstellenanalyse/": [
    "/de/23/Schwachstellenanalyse.html"
    
],



"https://www.schutzwerk.com/pruefung/social-engineering-assessment/": [
    "/de/29/Social-Engineering.html",
    "/de/77/Social-Engineering-mit-Schwerpunkt-Zutrittsschutz.html",
    "/de/78/Social-Engineering-mit-Schwerpunkt-Informationsschutz.html"
    
],



"https://www.schutzwerk.com/pruefung/web-application-security-assessment/": [
    "/de/24/Web-Application-Security-Assessment.html"
    
],



"https://www.schutzwerk.com/en/consulting/": [
    "/en/33/Consulting.html",
    "/en/33/Beratung.html"
     
],



"https://www.schutzwerk.com/en/consulting/effectiveness-and-economic-efficiency-assessment/": [
    "/en/79/Effectiveness-Economic-Efficiency-Assessment.html"
     
],



"https://www.schutzwerk.com/en/consulting/information-and-it-security/": [
    "/en/34/Information-IT-Security.html"
     
],



"https://www.schutzwerk.com/en/consulting/maturity-level-optimization/": [
    "/en/80/Maturity-Level-Optimization.html"
     
],





"https://www.schutzwerk.com/en/consulting/security-incidents/": [
    "/en/36/Security-Incidents.html"
     
],


"https://www.schutzwerk.com/beratung/": [
    "/de/33/Beratung.html"
    
],



"https://www.schutzwerk.com/beratung/informations-und-it-sicherheit/": [
    "/de/34/Informations-und-IT-Sicherheit.html"
    
],



"https://www.schutzwerk.com/beratung/reifegradoptimierung/": [
    "/de/80/Reifegradoptimierung.html"
    
],





"https://www.schutzwerk.com/beratung/sicherheitsvorfaelle/": [
    "/de/36/Sicherheitsvorfaelle.html"
    
],



"https://www.schutzwerk.com/beratung/wirksamkeits-und-wirtschaftlichkeitsbetrachtung/": [
    "/de/79/Wirksamkeits-und-Wirtschaftlichkeitsbetrachtung.html"
    
],



"https://www.schutzwerk.com/en/data/": [
    "/en/60/Data-Protection.html"
     
],


"https://www.schutzwerk.com/datenschutz/": [
    "/de/60/Datenschutz.html"
    
],



"https://www.schutzwerk.com/en/directions/": [
    "/en/45/Directions-Parking.html"
     
],


"https://www.schutzwerk.com/anfahrt-und-parken/": [
    "/de/45/Anfahrt-Parken.html"
    
],



"https://www.schutzwerk.com/en/funding/": [
    "/en/74/IT-security-is-eligible-for-funding,2,1,122.html"
     
],








"https://www.schutzwerk.com/foerderungen/": [
    "/de/74/IT-Sicherheit-ist-foerderbar,2,1,122.html"
    
],









"https://www.schutzwerk.com/en/imprint/": [
    "/en/61/Imprint.html"
     
],


"https://www.schutzwerk.com/impressum/": [
    "/de/61/Impressum.html"
    
],



"https://www.schutzwerk.com/en/partner/": [
    "/en/20/Partnerships.html"
     
],


"https://www.schutzwerk.com/partner/": [
    "/de/20/Partnerschaften.html"
    
],



"https://www.schutzwerk.com/en/process/": [
    "/en/37/Process.html",
    "/en/37/Prozesse.html"
     
],



"https://www.schutzwerk.com/en/process/incident-response-management/": [
    "/en/40/Incident-Response-Management.html"
     
],



"https://www.schutzwerk.com/en/process/information-security-management/": [
    "/en/38/Information-Security-Management-according-to-ISO-IEC-27001.html"
     
],



"https://www.schutzwerk.com/en/process/it-risk-management-according-to-iso-iec-27005/": [
    "/en/39/IT-Risk-Management-according-to-ISO-IEC-27005.html"
     
],


"https://www.schutzwerk.com/prozesse/": [
    "/de/37/Prozesse.html"
    
],



"https://www.schutzwerk.com/prozesse/incident-response-management/": [
    "/de/40/Incident-Response-Management.html"
    
],



"https://www.schutzwerk.com/prozesse/informationssicherheitsmanagement/": [
    "/de/38/Informationssicherheitsmanagement-nach-ISO-IEC-27001.html"
    
],



"https://www.schutzwerk.com/prozesse/it-risikomanagement-nach-iso-iec-27005/": [
    "/de/39/IT-Risikomanagement-nach-ISO-IEC-27005.html"
    
],



"https://www.schutzwerk.com/en/references/": [
    "/en/17/Reference-Projects.html"
     
],












"https://www.schutzwerk.com/referenzen/": [
    "/de/17/Referenzprojekte.html"
    
],













"https://www.schutzwerk.com/en/sitemap/": [
    "/en/62/Sitemap.html"
     
],


"https://www.schutzwerk.com/sitemap/": [
    "/de/62/Sitemap.html"
    
],



"https://www.schutzwerk.com/en/team/": [
    "/en/16/Team.html",
    "/en/76/Jakob-Pietzka,17.html",
    "/en/76/Michael-Schaefer,18.html"
     
],


"https://www.schutzwerk.com/team/": [
    "/de/16/Team.html",
    "/de/76/Michael-Schaefer,18.html",
    "/de/76/Jakob-Pietzka,17.html"
    
],



"https://www.schutzwerk.com/en/apply/": [
    "/en/73/Why-apply.html"
     
],




"https://www.schutzwerk.com/warum-bewerben/": [
    "/de/73/Warum-bewerben.html"
    
],





"https://www.schutzwerk.com/en/contact/": [
    "/en/44/Your-Points-of-Contact.html",
    "/en/14/Kontakt.html"
     
],


"https://www.schutzwerk.com/ansprechpartner/": [
    "/de/44/Ihre-Ansprechpartner.html",
    "/de/14/Kontakt.html"
    
]


}