{"id":25204,"date":"2023-10-24T09:47:29","date_gmt":"2023-10-24T07:47:29","guid":{"rendered":"https:\/\/www.sysbus.eu\/?p=25204"},"modified":"2023-10-16T09:53:44","modified_gmt":"2023-10-16T07:53:44","slug":"trend-thema-security-7","status":"publish","type":"post","link":"https:\/\/www.sysbus.eu\/?p=25204","title":{"rendered":"Trend-Thema &#8222;Security&#8220;"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.sysbus.eu\/wp-content\/uploads\/2023\/10\/TrendLogoSysbusMohamed-Ibbich-BeyondTrust.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"573\" src=\"https:\/\/www.sysbus.eu\/wp-content\/uploads\/2023\/10\/TrendLogoSysbusMohamed-Ibbich-BeyondTrust-1024x573.jpg\" alt=\"\" class=\"wp-image-25206\" srcset=\"https:\/\/www.sysbus.eu\/wp-content\/uploads\/2023\/10\/TrendLogoSysbusMohamed-Ibbich-BeyondTrust-1024x573.jpg 1024w, https:\/\/www.sysbus.eu\/wp-content\/uploads\/2023\/10\/TrendLogoSysbusMohamed-Ibbich-BeyondTrust-300x168.jpg 300w, https:\/\/www.sysbus.eu\/wp-content\/uploads\/2023\/10\/TrendLogoSysbusMohamed-Ibbich-BeyondTrust-768x430.jpg 768w, https:\/\/www.sysbus.eu\/wp-content\/uploads\/2023\/10\/TrendLogoSysbusMohamed-Ibbich-BeyondTrust.jpg 1206w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Quelle: Sysbus\/BeyondTrust<\/figcaption><\/figure>\n\n\n\n<p>&#8222;Die aktuelle Welle an Cyberangriffen basiert im Regelfall auf dem Missbrauch privilegierter Zugriffrechte und Identit\u00e4ten, mit denen Bedrohungsakteure gesch\u00e4ftliche IT-Systeme kompromittieren oder sensible Informationen stehlen&#8220;, so <a href=\"https:\/\/www.beyondtrust.com\/de\">Mohamed Ibbich, Director Solutions Engineering bei BeyondTrust<\/a>. &#8222;Zum Schutz von Remote-Access-Verbindungen m\u00fcssen Zugriffs- und Endpunkte anhand des Zero-Trust-Modells geh\u00e4rtet sowie eingesetzte Zugangsdaten kontrolliert, verwaltet und manipulationssicher zugeteilt werden.&#8220;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8222;Die aktuelle Welle an Cyberangriffen basiert im Regelfall auf dem Missbrauch privilegierter Zugriffrechte und Identit\u00e4ten, mit denen Bedrohungsakteure gesch\u00e4ftliche IT-Systeme kompromittieren oder sensible Informationen stehlen&#8220;, so Mohamed Ibbich, Director Solutions Engineering bei BeyondTrust. &#8222;Zum Schutz von Remote-Access-Verbindungen m\u00fcssen Zugriffs- und Endpunkte anhand des Zero-Trust-Modells geh\u00e4rtet sowie eingesetzte Zugangsdaten kontrolliert, verwaltet und manipulationssicher zugeteilt werden.&#8220;<\/p>\n","protected":false},"author":81,"featured_media":25206,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10751,37,8931],"tags":[12411,3408,14544,4873,11978],"class_list":["post-25204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advertorials","category-security","category-trends","tag-beyondtrust","tag-identitaet","tag-mohamed-ibbich","tag-zero-trust","tag-zugriffsrecht"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/posts\/25204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25204"}],"version-history":[{"count":1,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/posts\/25204\/revisions"}],"predecessor-version":[{"id":25207,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/posts\/25204\/revisions\/25207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/media\/25206"}],"wp:attachment":[{"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}