{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www-cf.iwelt.app\/category\/cybersecurity\/#CollectionPage","headline":"Cybersecurity Category","description":"","url":"https:\/\/www-cf.iwelt.app\/category\/cybersecurity\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/private-blockchain\/","headline":"Private Blockchain &#8211; Anwendungsf\u00e4lle im Unternehmensalltag","url":"https:\/\/www-cf.iwelt.app\/private-blockchain\/","datePublished":"2021-06-24","dateModified":"2021-06-24","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/private-blockchain\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Blockchain.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Blockchain.jpg","height":1109,"width":1664},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/verstecktes-kryptojacking-in-docker-images\/","headline":"Verstecktes Kryptojacking in Docker Images","url":"https:\/\/www-cf.iwelt.app\/verstecktes-kryptojacking-in-docker-images\/","datePublished":"2021-05-31","dateModified":"2021-05-31","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/verstecktes-kryptojacking-in-docker-images\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Kryptojacking-.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Kryptojacking-.jpg","height":1109,"width":1664},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/angriff-auf-exchange-server-durch-hafnium-exploit-so-schuetzen-sie-ihre-systeme\/","headline":"Angriff auf Exchange Server durch Hafnium Exploit \u2013 so sch\u00fctzen Sie Ihre Systeme","url":"https:\/\/www-cf.iwelt.app\/angriff-auf-exchange-server-durch-hafnium-exploit-so-schuetzen-sie-ihre-systeme\/","datePublished":"2021-04-23","dateModified":"2021-04-26","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/angriff-auf-exchange-server-durch-hafnium-exploit-so-schuetzen-sie-ihre-systeme\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Exchange_Server_Hafnium_Exploit_Blogbeitrag.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Exchange_Server_Hafnium_Exploit_Blogbeitrag.jpg","height":750,"width":1200},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/safer-internet-unternehmen-vor-cyberkriminalitaet-schuetzen\/","headline":"Safer Internet: Wie sich Unternehmen vor Cyberkriminalit\u00e4t sch\u00fctzen","url":"https:\/\/www-cf.iwelt.app\/safer-internet-unternehmen-vor-cyberkriminalitaet-schuetzen\/","datePublished":"2021-02-09","dateModified":"2021-02-09","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/safer-internet-unternehmen-vor-cyberkriminalitaet-schuetzen\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Cyber-Security-Kopie.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Cyber-Security-Kopie.jpg","height":1109,"width":1664},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/kundendaten-5-tipps-fuer-den-richtigen-schutz\/","headline":"Kundendaten: 5 Tipps f\u00fcr den richtigen Schutz","url":"https:\/\/www-cf.iwelt.app\/kundendaten-5-tipps-fuer-den-richtigen-schutz\/","datePublished":"2021-01-28","dateModified":"2021-01-28","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/kundendaten-5-tipps-fuer-den-richtigen-schutz\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Datenschutz.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Datenschutz.jpg","height":1109,"width":1664},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/drittes-geschlecht-online-shops\/","headline":"Urteil zu drittem Geschlecht in Online-Shops","url":"https:\/\/www-cf.iwelt.app\/drittes-geschlecht-online-shops\/","datePublished":"2020-12-14","dateModified":"2020-12-15","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/drittes-geschlecht-online-shops\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/simon-kiesel\/#Person","name":"Simon Kiesel","url":"https:\/\/www-cf.iwelt.app\/author\/simon-kiesel\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/dc488d81fc02cd53f8306ddc53c9787e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dc488d81fc02cd53f8306ddc53c9787e?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/urteil-e1608022438251.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/urteil-e1608022438251.jpg","height":390,"width":800},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/wueww2020\/","headline":"iWelt Programm im Rahmen der W\u00fcrzburg Web Week 2020","url":"https:\/\/www-cf.iwelt.app\/wueww2020\/","datePublished":"2020-10-05","dateModified":"2020-10-05","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/wueww2020\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/simon-kiesel\/#Person","name":"Simon Kiesel","url":"https:\/\/www-cf.iwelt.app\/author\/simon-kiesel\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/dc488d81fc02cd53f8306ddc53c9787e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dc488d81fc02cd53f8306ddc53c9787e?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Wueww2020neu.png","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Wueww2020neu.png","height":1472,"width":1644},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/cybersecurity-roundtable-am-7-oktober-2020-mit-regionalen-unternehmen-it-security-herstellern-cios-und-cisos\/","headline":"Cybersecurity-Roundtable am 7. Oktober 2020 &#8211; mit regionalen Unternehmen, IT-Security-Herstellern, CIOs und CISOs","url":"https:\/\/www-cf.iwelt.app\/cybersecurity-roundtable-am-7-oktober-2020-mit-regionalen-unternehmen-it-security-herstellern-cios-und-cisos\/","datePublished":"2020-09-24","dateModified":"2020-10-05","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/cybersecurity-roundtable-am-7-oktober-2020-mit-regionalen-unternehmen-it-security-herstellern-cios-und-cisos\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Kopie_von_main.IT_Throwback-e1608626305817.png","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Kopie_von_main.IT_Throwback-e1608626305817.png","height":745,"width":896},"keywords":null}]}