{"id":6282,"date":"2020-01-25T10:23:40","date_gmt":"2020-01-25T09:23:40","guid":{"rendered":"https:\/\/www.astoncon.com\/heim\/"},"modified":"2023-11-09T16:28:54","modified_gmt":"2023-11-09T15:28:54","slug":"home","status":"publish","type":"page","link":"https:\/\/www.astoncon.com\/de\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t
\n\t\t\t

<\/p>\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"Slide\"\nExpertise in Cyber Security \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"Slide\"\nCyber Vulnerability Detection \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"Slide\"\nProtection Against Potential Hacking Attacks \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"Slide\"\nCyber Guarding Systems \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"Slide\"\nNetwork Protection And System Recovery \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"Slide\"\nCyber Fraud Prevention \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t\n\t\t\t\t\t\t\t<\/rs-layer> \n\t\t\t\t\t\t\t<\/rs-layer><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t