{"id":214795,"date":"2026-04-27T09:38:42","date_gmt":"2026-04-27T08:38:42","guid":{"rendered":"https:\/\/www.kuhn.or.at\/?page_id=214795"},"modified":"2026-04-27T09:45:42","modified_gmt":"2026-04-27T08:45:42","slug":"security-insider","status":"publish","type":"page","link":"https:\/\/www.kuhn.or.at\/?page_id=214795","title":{"rendered":"Security Insider"},"content":{"rendered":"<div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template \">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/isc2-verhaltenskodex-ethik-leitlinien-cybersicherheit-a-e0c12b05e874d2c8bccb3c5e1a4a8960\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Verhaltenscodex f\u00fcr Sicher\u00adheits\u00adexperten von ISC2<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-05-01\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/bsi-c3a-kriterien-souveraene-cloud-nutzung-a-1c2b8693134745e3355cd56c779e89f4\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Kriterienkatalog C3A des BSI setzt neuen Ma\u00dfstab f\u00fcr souver\u00e4ne Cloud-Nutzung<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-05-01\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/herausforderungen-und-risiken-in-der-datensicherheit-a-f27b669ffebf381838d68aeda101a452\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Herausforderungen und Risiken in der Datensicherheit<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-05-01\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/mikrosegmentierung-praxis-stolperstein-perfektionismus-a-0ca2333285c1009755531236060c945c\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Mikrosegmentierung: Nicht warten, sondern starten<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-05-01\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/fujitsu-digital-sovereignty-advisory-services-a-dbd512e7e130306a6c78529b8abf4550\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Fujitsu bringt Beratungsangebot f\u00fcr digitale Souver\u00e4nit\u00e4t auf den Markt<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-05-01\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/shadypanda-browser-erweiterungen-blinder-fleck-it-security-a-945c66773177ec228e8a7e7661aeade3\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Der Browser ist der neue blinde Fleck der IT-Security<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-05-01\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/qualcomm-bootrom-luecke-secure-boot-umgehen-a-c113cab8913615bd339b056f09726dd6\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">7 Serien von Qualcomm-Chips\u00e4tzen von gef\u00e4hrlicher Sicherheitsl\u00fccke betroffen<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-05-01\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/ai-schwachstellen-stunden-ciso-plan-csa-sans-a-db07c3da7f4d7cdf35951cfbbf52d283\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">250 CISOs ver\u00f6ffentlichen AI-Strategie-Briefing<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-04-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/trendai-setzt-auf-claude-a-e2f5307ccebb2fd8dacd33d6e2c8b82a\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">TrendAI setzt auf Claude<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-04-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/glarysoft-file-recovery-free-a-5a5b830320d133d40dd21d0790262d19\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Glarysoft File Recovery Free<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-04-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/nis2-it-lieferkette-interconnection-strategie-resilienz-a-e0e7326f71d4515aceededcf46160304\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Wie NIS2 die Sicherheit in IT-Lieferketten erzwingt<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-04-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/warnung-chinesische-hacker-iot-smart-devices-spionage-a-a84615a4a16f28649ddb81bc3da32253\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Chinas Cyberspione nutzen gekaperte Ger\u00e4te als Tarnung<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-04-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/commvault-erweitert-dspm-auf-strukturierte-und-ki-daten-a-04180df6ab7a5425f54ad764a257c693\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Commvault erweitert DSPM auf strukturierte und KI-Daten<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-04-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/ucc-sicherheit-kritische-infrastruktur-security-by-design-a-994134541ca28ca73ac75e67a35c50db\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Unified Communication geh\u00f6rt heute zur kritischen Infrastruktur<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-04-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.security-insider.de\/pack2theroot-root-exploit-packagekit-cve-2026-41651-a-fe528109a86253ae2b0a7c51fe970808\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Telekom entdeckt 12 Jahre alte Linux-Root-Schwachstelle<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.security-insider.de\/rss\/news.xml\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Security-Insider<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2026-04-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-214795","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kuhn.or.at\/index.php?rest_route=\/wp\/v2\/pages\/214795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kuhn.or.at\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kuhn.or.at\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kuhn.or.at\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kuhn.or.at\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=214795"}],"version-history":[{"count":2,"href":"https:\/\/www.kuhn.or.at\/index.php?rest_route=\/wp\/v2\/pages\/214795\/revisions"}],"predecessor-version":[{"id":214797,"href":"https:\/\/www.kuhn.or.at\/index.php?rest_route=\/wp\/v2\/pages\/214795\/revisions\/214797"}],"wp:attachment":[{"href":"https:\/\/www.kuhn.or.at\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=214795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}