{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www-cf.iwelt.app\/category\/cybersecurity\/#CollectionPage","headline":"Cybersecurity Category","description":"","url":"https:\/\/www-cf.iwelt.app\/category\/cybersecurity\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/sicherheit-bei-dedicated-root-servern\/","headline":"Sicherheitsaspekte bei Dedicated Root Servern: Schutz vor DDoS, Malware und anderen Bedrohungen","url":"https:\/\/www-cf.iwelt.app\/sicherheit-bei-dedicated-root-servern\/","datePublished":"2024-09-09","dateModified":"2024-09-06","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/sicherheit-bei-dedicated-root-servern\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/sicherheitaspekte-dedicated-root-server.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/sicherheitaspekte-dedicated-root-server.jpg","height":800,"width":1200},"keywords":["Cybersecurity","dedicated root server"]},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/typo3-sicherheit-warum-typo3-sicherer-ist\/","headline":"TYPO3 Sicherheit: Warum TYPO3 sicherer ist und wie Sie es sicher halten","url":"https:\/\/www-cf.iwelt.app\/typo3-sicherheit-warum-typo3-sicherer-ist\/","datePublished":"2024-08-12","dateModified":"2024-11-14","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/typo3-sicherheit-warum-typo3-sicherer-ist\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/typo3-sicherheit-warum-typo3-sicherer-ist.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/typo3-sicherheit-warum-typo3-sicherer-ist.jpg","height":800,"width":1200},"keywords":["cms","TYPO3"]},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/anycast-dns-die-zukunft-der-schnellen-und-sicheren-dns-resolution\/","headline":"Anycast DNS: Die Zukunft der schnellen und sicheren DNS-Resolution","url":"https:\/\/www-cf.iwelt.app\/anycast-dns-die-zukunft-der-schnellen-und-sicheren-dns-resolution\/","datePublished":"2024-08-05","dateModified":"2024-08-05","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/anycast-dns-die-zukunft-der-schnellen-und-sicheren-dns-resolution\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/anycast-dns-mit-der-iwelt.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/anycast-dns-mit-der-iwelt.jpg","height":800,"width":1200},"keywords":["anycast dns"]},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/e-mail-archivierung\/","headline":"Rechtssichere E-Mail-Archivierung f\u00fcr Ihr Unternehmen","url":"https:\/\/www-cf.iwelt.app\/e-mail-archivierung\/","datePublished":"2022-11-04","dateModified":"2023-02-16","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/e-mail-archivierung\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Blogbeitrag-Bild.png","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Blogbeitrag-Bild.png","height":1109,"width":1664},"keywords":["Archivierung","Archivierung Rechnungen","Archivierung Vertr\u00e4ge","DSGVO","DSGVO E-Mails","DSGVO Mails","E-Mail-Archivierung","Mail-Archivierung","Rechtssichere E-Mail-Archivierung"]},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/it-security-trends\/","headline":"Webinar: IT-Security Trends (27.10.2022)","url":"https:\/\/www-cf.iwelt.app\/it-security-trends\/","datePublished":"2022-10-13","dateModified":"2023-02-16","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/it-security-trends\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Webinar_IT_Security_Trends_1664_1109_Blog.jpeg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Webinar_IT_Security_Trends_1664_1109_Blog.jpeg","height":1109,"width":1664},"keywords":["Cybersecurity","IT-Infrastruktur","IT-Security","IT-Sicherheit","IT-Trends","SASE","Secure Access Service Edge\"","Zero Trust","ZTNA"]},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/5-tipps-wie-sie-ihren-onlineshop-gegen-hacker-absichern\/","headline":"5 Tipps, wie Sie Ihren Onlineshop gegen Hacker absichern","url":"https:\/\/www-cf.iwelt.app\/5-tipps-wie-sie-ihren-onlineshop-gegen-hacker-absichern\/","datePublished":"2022-02-18","dateModified":"2022-02-18","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/5-tipps-wie-sie-ihren-onlineshop-gegen-hacker-absichern\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/tipps-gegen-hackerangriffe.png","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/tipps-gegen-hackerangriffe.png","height":1109,"width":1664},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/ttdsg\/","headline":"Cookies auch nach der TTDSG rechtssicher einsetzen","url":"https:\/\/www-cf.iwelt.app\/ttdsg\/","datePublished":"2021-12-03","dateModified":"2021-12-06","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/ttdsg\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/simon-kiesel\/#Person","name":"Simon Kiesel","url":"https:\/\/www-cf.iwelt.app\/author\/simon-kiesel\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/dc488d81fc02cd53f8306ddc53c9787e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dc488d81fc02cd53f8306ddc53c9787e?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Cookies.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Cookies.jpg","height":600,"width":900},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/die-iwelt-auf-der-wuerzburg-web-week-2021\/","headline":"Die iWelt auf der W\u00fcrzburg Web Week 2021","url":"https:\/\/www-cf.iwelt.app\/die-iwelt-auf-der-wuerzburg-web-week-2021\/","datePublished":"2021-10-06","dateModified":"2021-10-06","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/die-iwelt-auf-der-wuerzburg-web-week-2021\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/WueWebWeek_Blog_1664x1109.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/WueWebWeek_Blog_1664x1109.jpg","height":1109,"width":1664},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/cyber-security-interview\/","headline":"Cyber-Security: \u201eMan sollte offen und ehrlich mit einem Angriff umgehen\u201c","url":"https:\/\/www-cf.iwelt.app\/cyber-security-interview\/","datePublished":"2021-09-10","dateModified":"2021-09-10","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/cyber-security-interview\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/iWelt_WiM_2021-png.png","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/iWelt_WiM_2021-png.png","height":1109,"width":1664},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/rechtswidrige-cookie-banner\/","headline":"Rechtswidrige Cookie-Banner: das erwartet Websitebetreiber","url":"https:\/\/www-cf.iwelt.app\/rechtswidrige-cookie-banner\/","datePublished":"2021-08-18","dateModified":"2021-12-03","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/rechtswidrige-cookie-banner\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Cookiebanner_iWelt_Blog.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Cookiebanner_iWelt_Blog.jpg","height":1109,"width":1664},"keywords":null}]}