{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www-cf.iwelt.app\/tag\/cybersecurity\/#CollectionPage","headline":"Cybersecurity Tag","description":"","url":"https:\/\/www-cf.iwelt.app\/tag\/cybersecurity\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/sicherheit-bei-dedicated-root-servern\/","headline":"Sicherheitsaspekte bei Dedicated Root Servern: Schutz vor DDoS, Malware und anderen Bedrohungen","url":"https:\/\/www-cf.iwelt.app\/sicherheit-bei-dedicated-root-servern\/","datePublished":"2024-09-09","dateModified":"2024-09-06","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/sicherheit-bei-dedicated-root-servern\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/sicherheitaspekte-dedicated-root-server.jpg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/sicherheitaspekte-dedicated-root-server.jpg","height":800,"width":1200},"keywords":["Cybersecurity","dedicated root server"]},{"@type":"BlogPosting","@id":"https:\/\/www-cf.iwelt.app\/it-security-trends\/","headline":"Webinar: IT-Security Trends (27.10.2022)","url":"https:\/\/www-cf.iwelt.app\/it-security-trends\/","datePublished":"2022-10-13","dateModified":"2023-02-16","mainEntityOfPage":"https:\/\/www-cf.iwelt.app\/it-security-trends\/","author":{"@type":"Person","@id":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www-cf.iwelt.app\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd4b71b280381c56b1658986058ab93a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Webinar_IT_Security_Trends_1664_1109_Blog.jpeg","url":"https:\/\/www-cf.iwelt.app\/wp-content\/uploads\/Webinar_IT_Security_Trends_1664_1109_Blog.jpeg","height":1109,"width":1664},"keywords":["Cybersecurity","IT-Infrastruktur","IT-Security","IT-Sicherheit","IT-Trends","SASE","Secure Access Service Edge\"","Zero Trust","ZTNA"]}]}