{"id":63279,"date":"2023-11-01T08:40:17","date_gmt":"2023-11-01T07:40:17","guid":{"rendered":"https:\/\/vtwww6.softed.de\/softed\/?page_id=63279"},"modified":"2025-10-29T11:02:40","modified_gmt":"2025-10-29T10:02:40","slug":"blog","status":"publish","type":"page","link":"https:\/\/www.softed.de\/softed\/","title":{"rendered":"Blog"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"63279\" class=\"elementor elementor-63279\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec426c2 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"ec426c2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d94bc05\" data-id=\"d94bc05\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30a1697 elementor-widget elementor-widget-heading\" data-id=\"30a1697\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Der SoftEd Technologie Blog<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-499b330 elementor-widget__width-initial hr elementor-hidden-mobile elementor-hidden-desktop elementor-hidden-tablet elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"499b330\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc96de6 centered elementor-widget elementor-widget-html\" data-id=\"bc96de6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<form role=\"search\" method=\"get\" class=\"search-form\" action=\"\/seminare\/suche\">\r\n\t\t\t\t<label>\r\n\t\t\t\t\t<span class=\"screen-reader-text\">Suche nach:<\/span>\r\n\t\t\t\t\t<input type=\"search\" class=\"search-field\" placeholder=\"Suche&nbsp;\u2026\" value=\"\" name=\"s\"><input type=\"hidden\" name=\"mode\" value=\"blog\">\r\n\t\t\t\t<\/label>\r\n\t\t\t\t<button class=\"searchicon2\" type=\"submit\">\r\n                    <i class=\"fas fa-search\"><\/i>\r\n                <\/button>\r\n\t\t\t<\/form>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d3a1630 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d3a1630\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4812f49\" data-id=\"4812f49\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a90b78 premium-blog-align-left elementor-widget elementor-widget-premium-addon-blog\" data-id=\"5a90b78\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;force_height&quot;:&quot;true&quot;,&quot;premium_blog_infinite_scroll&quot;:&quot;yes&quot;,&quot;premium_blog_columns_number&quot;:&quot;33.33%&quot;,&quot;_animation&quot;:&quot;none&quot;,&quot;filter_flag&quot;:&quot;cat&quot;,&quot;premium_blog_grid&quot;:&quot;yes&quot;,&quot;premium_blog_layout&quot;:&quot;even&quot;,&quot;premium_blog_columns_number_tablet&quot;:&quot;50%&quot;,&quot;premium_blog_columns_number_mobile&quot;:&quot;100%&quot;,&quot;scroll_to_offset&quot;:&quot;yes&quot;}\" data-widget_type=\"premium-addon-blog.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-filter\">\r\n\t\t\t<ul class=\"premium-blog-filters-container\">\r\n\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category active\" data-filter=\"*\">\r\n\t\t\t\t\t\t\tAlle\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"aktuelles\">\r\n\t\t\t\t\t\t\t\tAktuelles\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"development\">\r\n\t\t\t\t\t\t\t\tDevelopment\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"events\">\r\n\t\t\t\t\t\t\t\tEvents\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"it-infrastruktur\">\r\n\t\t\t\t\t\t\t\tIT-Infrastruktur\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"it-security\">\r\n\t\t\t\t\t\t\t\tIT-Security\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"microsoft-office\">\r\n\t\t\t\t\t\t\t\tMicrosoft Office\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"scrum\">\r\n\t\t\t\t\t\t\t\tScrum\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"sql-server-bi\">\r\n\t\t\t\t\t\t\t\tSQL Server &amp; BI\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t<li>\r\n\t\t\t\t\t\t\t<a href=\"javascript:;\" class=\"category\" data-filter=\"training\">\r\n\t\t\t\t\t\t\t\tTraining\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t<\/div>\r\n\t\t\t\t\r\n\r\n\t\t\t\t<div class=\"premium-blog-wrap  premium-blog-even\" data-page=\"63279\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-post-outer-container it-security aktuelles\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/stand-der-technik-bsi-kongress-cybersicherheit\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2026\/04\/blogpost-header-stand-der-technik.jpg\" title=\"blogpost-header-stand-der-technik\" alt=\"Headergrafik zum BSI 21. Deutschen IT-Sicherheitskongress mit Symbolen f\u00fcr Recht, IT-Sicherheit und Prozessverkn\u00fcpfung zwischen Referenzmodellen.\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/stand-der-technik-bsi-kongress-cybersicherheit\/\" target=\"_self\"><span>\u203aStand der Technik\u2039: Alle reden dar\u00fcber. Jetzt wird es endlich greifbarer.<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/stand-der-technik-bsi-kongress-cybersicherheit\/\" target=\"_self\">\r\n\t\t\t\t\u203aStand der Technik\u2039: Alle reden dar\u00fcber. Jetzt wird es endlich greifbarer.\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">Was hei\u00dft \u201eStand der Technik\u201c in der Cybersicherheit eigentlich konkret? Wie daraus mehr Orientierung f\u00fcr IT, Security und Compliance wird.<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/stand-der-technik-bsi-kongress-cybersicherheit\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t<div class=\"premium-blog-post-outer-container it-security\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/blog-penetration-testing-einfach-erklaert\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2025\/05\/blogpost-header-penetration-testing.jpg\" title=\"header penetration testing\" alt=\"Die Membran einer Blase wird von einer Nadel einer Spritze durchstochen, die Schadcode in das Innere der Blase injiziert. Im Inneren der Blase befindet sich ein aufgeklappter Laptop mit leuchtendem Display, der vollst\u00e4ndig von der Membran der Blase umschlossen wird. Die Blase befindet sich in der Bildmitte, die Spritze kommt senkrecht von oben. Super detailierte Nahaufnahme der Nadel in der Membran der Blase vor tief dunklem t\u00fcrkisfarbenen bis bl\u00e4ulichen Hintergrund.\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/blog-penetration-testing-einfach-erklaert\/\" target=\"_self\"><span>Penetration Test einfach erkl\u00e4rt: So entdecken Sie gef\u00e4hrliche IT-Sicherheitsl\u00fccken rechtzeitig!<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/blog-penetration-testing-einfach-erklaert\/\" target=\"_self\">\r\n\t\t\t\tPenetration Test einfach erkl\u00e4rt: So entdecken Sie gef\u00e4hrliche IT-Sicherheitsl\u00fccken rechtzeitig!\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">Wie st\u00e4rken systematische Penetrationstests Ihre IT-Sicherheit? &#x2714;&#xfe0f; So erkennen Sie Sicherheitsl\u00fccken, bevor Cyberangriffe Schaden anrichten.<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/blog-penetration-testing-einfach-erklaert\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t<div class=\"premium-blog-post-outer-container it-security\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/it-sicherheit-versteckte-risiken-interview\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2026\/04\/blogpost-header-Ostern-Security-Interview.jpg\" title=\"blogpost-header-Ostern-Security-Interview\" alt=\"blogpost-header-Ostern-Security-Interview\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/it-sicherheit-versteckte-risiken-interview\/\" target=\"_self\"><span>\u203aWas du nicht findest, findet der Angreifer zuerst\u2039<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/it-sicherheit-versteckte-risiken-interview\/\" target=\"_self\">\r\n\t\t\t\t\u203aWas du nicht findest, findet der Angreifer zuerst\u2039\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">Wie steht es aktuell um Cybersecurity? Sicherheitsexperte Thomas Lundstr\u00f6m \u00fcber versteckte Risiken, Incident Response und konkrete Tipps f\u00fcr Ihren IT-Sicherheitscheck zu Ostern.<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/it-sicherheit-versteckte-risiken-interview\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t<div class=\"premium-blog-post-outer-container events\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/softed-netnight-inspiration-26\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2026\/03\/nni26-blogpost-header.jpg\" title=\"NetNight-26\" alt=\"NetNight-26\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/softed-netnight-inspiration-26\/\" target=\"_self\"><span>SoftEd NetNight Inspiration 26: volle Reihen, starke Themen, beste Gespr\u00e4che<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/softed-netnight-inspiration-26\/\" target=\"_self\">\r\n\t\t\t\tSoftEd NetNight Inspiration 26: volle Reihen, starke Themen, beste Gespr\u00e4che\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">150 Teilnehmer, volle Tracks, starke Keynotes. Die SoftEd NetNight Inspiration 26 \u2013 von AI \u00fcber NIS-2 bis Live Hacking.<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/softed-netnight-inspiration-26\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t<div class=\"premium-blog-post-outer-container it-infrastruktur it-security\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/sicherheitsalarm-microsoft-exchange-server\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2026\/03\/blogpost-header-microsoft-sicherheitsalarm.jpg\" title=\"blogpost-header-microsoft-sicherheitsalarm\" alt=\"blogpost-header-microsoft-sicherheitsalarm\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/sicherheitsalarm-microsoft-exchange-server\/\" target=\"_self\"><span>Microsoft Sicherheitsalarm: Echte Warnung oder gef\u00e4hrliche F\u00e4lschung?<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/sicherheitsalarm-microsoft-exchange-server\/\" target=\"_self\">\r\n\t\t\t\tMicrosoft Sicherheitsalarm: Echte Warnung oder gef\u00e4hrliche F\u00e4lschung?\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">Fake Microsoft Sicherheitsalarm erkennen: 5 Warnzeichen &amp; klare Handlungsempfehlungen + So sch\u00fctzen sich Unternehmen pr\u00e4ventiv vor Phishing und Co. &#x2714;&#xfe0f;<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/sicherheitsalarm-microsoft-exchange-server\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t<div class=\"premium-blog-post-outer-container it-security\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/bsi-standard-200-4-bcm-notfallmanagement\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2023\/06\/blogpost-header-bsi-standard-200-4.png\" title=\"IT-Compliance leicht gemacht: Was steckt hinter BSI 200-4?\" alt=\"Illustration einer Person im Anzug mit roter Krawatte, die ein Dokument mit der Aufschrift \u201e200-4\u201c und Bundesadler-Emblem in der Hand h\u00e4lt und den Daumen hoch zeigt \u2013 Symbolbild f\u00fcr regulatorische Vorgaben oder IT-Compliance.\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/bsi-standard-200-4-bcm-notfallmanagement\/\" target=\"_self\"><span>IT-Notfallmanagement: So bleiben Sie im Ernstfall handlungsf\u00e4hig<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/bsi-standard-200-4-bcm-notfallmanagement\/\" target=\"_self\">\r\n\t\t\t\tIT-Notfallmanagement: So bleiben Sie im Ernstfall handlungsf\u00e4hig\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">IT-Notfallmanagement praxisnah erkl\u00e4rt &#x2714;&#xfe0f; Typische IT-Schadensf\u00e4lle, gesetzliche Anforderungen &amp; konkrete Tipps f\u00fcr Entscheider<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/bsi-standard-200-4-bcm-notfallmanagement\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t<div class=\"premium-blog-post-outer-container it-security it-infrastruktur\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/it-risikomanagement\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2026\/02\/blogpost-header-risikomanagement-2-1.jpg\" title=\"blogpost-header-risikomanagement-2\" alt=\"blogpost-header-risikomanagement-2\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/it-risikomanagement\/\" target=\"_self\"><span>IT-Risikomanagement: So sch\u00fctzen Sie Ihr Unternehmen!<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/it-risikomanagement\/\" target=\"_self\">\r\n\t\t\t\tIT-Risikomanagement: So sch\u00fctzen Sie Ihr Unternehmen!\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">IT-Risikomanagement: Risiken systematisch erkennen und minimieren &#x2714;&#xfe0f; Praxisleitfaden f\u00fcr Unternehmen und Beh\u00f6rden.<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/it-risikomanagement\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t<div class=\"premium-blog-post-outer-container microsoft-office aktuelles training\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/w-ware-der-unterschaetzte-buchstabe-der-softwarewelt\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2026\/01\/blogpost-header-w-ware.jpg\" title=\"blogpost-header-w-ware\" alt=\"blogpost-header-w-ware\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/w-ware-der-unterschaetzte-buchstabe-der-softwarewelt\/\" target=\"_self\"><span>W-Ware \u2013 Der untersch\u00e4tzte Buchstabe der Softwarewelt<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/w-ware-der-unterschaetzte-buchstabe-der-softwarewelt\/\" target=\"_self\">\r\n\t\t\t\tW-Ware \u2013 Der untersch\u00e4tzte Buchstabe der Softwarewelt\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">Es gibt viele Betrachtungen zur Softwarewelt \u2013 aber diese hier ist anders. Sie dreht sich um einen einzigen Buchstaben: W.<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/w-ware-der-unterschaetzte-buchstabe-der-softwarewelt\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t<div class=\"premium-blog-post-outer-container aktuelles\" data-total=\"6\">\r\n\t\t\t<div class=\"premium-blog-post-container premium-blog-skin-modern\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-thumb-effect-wrapper\">\r\n\t\t\t\t\t\t<div class=\"premium-blog-thumbnail-container premium-blog-zoomin-effect\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/was-war-was-kommt-was-sich-zu-lernen-lohnt\/\" target=\"_self\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.softed.de\/softed\/wp-content\/uploads\/2026\/01\/blogpost-header-welcome-2026.jpg\" title=\"blogpost-header-welcome-2026\" alt=\"Welcome 2026\" loading=\"lazy\" \/>\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-effect-container premium-blog-none-effect\">\r\n\t\t\t\t\t\t\t\t<a class=\"premium-blog-post-link\" href=\"https:\/\/www.softed.de\/softed\/was-war-was-kommt-was-sich-zu-lernen-lohnt\/\" target=\"_self\"><span>Was war. Was kommt. Was sich zu lernen lohnt. Jahresr\u00fcckblick 2025 &amp; Ausblick 2026<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-blog-content-wrapper \">\r\n\r\n\t\t\t\t\t<div class=\"premium-blog-inner-container\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"premium-blog-entry-title\">\r\n\t\t\t<a href=\"https:\/\/www.softed.de\/softed\/was-war-was-kommt-was-sich-zu-lernen-lohnt\/\" target=\"_self\">\r\n\t\t\t\tWas war. Was kommt. Was sich zu lernen lohnt. Jahresr\u00fcckblick 2025 &amp; Ausblick 2026\t\t\t<\/a>\r\n\t\t<\/h2>\r\n\t\t\t\t<div class=\"premium-blog-entry-meta\">\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"premium-blog-content-inner-wrapper\">\r\n\t\t<p class=\"premium-blog-post-content\">Was war. Was kommt. Was sich zu lernen lohnt. Lernen, KI und IT-Sicherheit neu gedacht \u2013 mit Praxisbezug, Strategie und konkreten Projekten f\u00fcr 2026. Unser Jahresr\u00fcckblick &amp; Impulse f\u00fcr 2026.<\/p><div class=\"premium-blog-excerpt-link-wrap\"><a href=\"https:\/\/www.softed.de\/softed\/was-war-was-kommt-was-sich-zu-lernen-lohnt\/\" target=\"_self\" class=\"premium-blog-excerpt-link elementor-button\">Weiterlesen \u00bb<\/a><\/div>\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\r\n\t\t\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Der SoftEd Technologie Blog Suche nach: Alle Aktuelles Development Events IT-Infrastruktur IT-Security Microsoft Office Scrum SQL Server &amp; BI Training Secure Boot 2026: Zertifikate laufen ab \u2013 Wegschauen ist keine Option Secure Boot 2026: Zertifikate laufen ab \u2013 Wegschauen ist keine Option Ab Juni 2026 verlieren wichtige Secure-Boot-Zertifikate ihre G\u00fcltigkeit \u2013 jedes Windows-Ger\u00e4t ab 2012 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-63279","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.softed.de\/softed\/wp-json\/wp\/v2\/pages\/63279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softed.de\/softed\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.softed.de\/softed\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.softed.de\/softed\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softed.de\/softed\/wp-json\/wp\/v2\/comments?post=63279"}],"version-history":[{"count":30,"href":"https:\/\/www.softed.de\/softed\/wp-json\/wp\/v2\/pages\/63279\/revisions"}],"predecessor-version":[{"id":70294,"href":"https:\/\/www.softed.de\/softed\/wp-json\/wp\/v2\/pages\/63279\/revisions\/70294"}],"wp:attachment":[{"href":"https:\/\/www.softed.de\/softed\/wp-json\/wp\/v2\/media?parent=63279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}