{"id":20172,"date":"2025-03-03T22:56:02","date_gmt":"2025-03-03T21:56:02","guid":{"rendered":"https:\/\/defenderbox.de\/?page_id=20172"},"modified":"2026-03-02T21:53:58","modified_gmt":"2026-03-02T20:53:58","slug":"news","status":"publish","type":"page","link":"https:\/\/defenderbox.de\/en\/news\/","title":{"rendered":"News"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"20172\" class=\"elementor elementor-20172\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-97cec8a section-de e-flex e-con-boxed e-con e-parent\" data-id=\"97cec8a\" data-element_type=\"container\" data-e-type=\"container\" id=\"herovx\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a3eae2 e-con-full e-flex e-con e-child\" data-id=\"2a3eae2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f01c13 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6f01c13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NEWS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92ae7cd elementor-widget elementor-widget-heading\" data-id=\"92ae7cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect your company - simply, quickly and cyber-securely with the DEFENDERBOX!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3b3c8a e-flex e-con-boxed e-con e-parent\" data-id=\"c3b3c8a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c1af75 blogslider elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-widget elementor-widget-posts\" data-id=\"0c1af75\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;pagination_type&quot;:&quot;numbers&quot;,&quot;classic_columns&quot;:&quot;3&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-27637 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/iso27001\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-30.-Maerz-2026-13_15_31-300x200.png\" class=\"attachment-medium size-medium wp-image-27641\" alt=\"\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-30.-Maerz-2026-13_15_31-300x200.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-30.-Maerz-2026-13_15_31-1024x683.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-30.-Maerz-2026-13_15_31-768x512.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-30.-Maerz-2026-13_15_31-18x12.png 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-30.-Maerz-2026-13_15_31.png 1536w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/iso27001\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tISO 27001 Certification\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 16, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Security should no longer be just a promise, but become visible, measurable, and verifiable. We are starting our ISO 27001 certification.<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/iso27001\/\" aria-label=\"Read more about ISO 27001 Zertifizierung\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-27485 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/zero-trust\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"148\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-26-300x148.png\" class=\"attachment-medium size-medium wp-image-27483\" alt=\"\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-26-300x148.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-26-1024x505.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-26-768x379.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-26-18x9.png 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-26.png 1536w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/zero-trust\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tZero Trust in Practice\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 9, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Zero Trust is more than just a buzzword \u2013 it's a crucial component of modern IT security concepts. Learn how to implement it with continuous penetration testing, clear IT security policies\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/zero-trust\/\" aria-label=\"Read more about Zero Trust in der Praxis\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-27518 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-it-sicherheit tag-pentest tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/partnerschaft-radiflow\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/Radiflow-neu-2-300x169.jpg\" class=\"attachment-medium size-medium wp-image-27742\" alt=\"\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/Radiflow-neu-2-300x169.jpg 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/Radiflow-neu-2-1024x576.jpg 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/Radiflow-neu-2-768x432.jpg 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/Radiflow-neu-2-1536x864.jpg 1536w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/Radiflow-neu-2-18x10.jpg 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/Radiflow-neu-2.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/partnerschaft-radiflow\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tPartnership with Radiflow\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 31, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>DEFENDERBOX partners with Radiflow \u2013 this means more OT protection for industry &amp; production!<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/partnerschaft-radiflow\/\" aria-label=\"Read more about Partnerschaft mit Radiflow\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-27470 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/schwachstellen-scanner\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-26.-Maerz-2026-11_19_14-300x200.png\" class=\"attachment-medium size-medium wp-image-27476\" alt=\"\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-26.-Maerz-2026-11_19_14-300x200.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-26.-Maerz-2026-11_19_14-1024x683.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-26.-Maerz-2026-11_19_14-768x512.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-26.-Maerz-2026-11_19_14-18x12.png 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-26.-Maerz-2026-11_19_14.png 1536w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/schwachstellen-scanner\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tWhy traditional vulnerability scanners are no longer sufficient\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 26, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Many companies still rely on traditional vulnerability management tools \u2013 and overlook real attack risks. In this article, we show why automated pentesting\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/schwachstellen-scanner\/\" aria-label=\"Read more about Warum klassische Schwachstellen-Scanner nicht mehr ausreichen\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-27210 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/360-grad-cyberrisiken\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/360-Grad-Sicht-300x200.png\" class=\"attachment-medium size-medium wp-image-27222\" alt=\"DEFENDERBOX 360\u00b0 View of Cyber Risks\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/360-Grad-Sicht-300x200.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/360-Grad-Sicht-1024x683.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/360-Grad-Sicht-768x512.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/360-Grad-Sicht-18x12.png 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/360-Grad-Sicht.png 1260w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/360-grad-cyberrisiken\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\t360\u00b0 View of Cyber Risks\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 19, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Discover why a 360\u00b0 view of IT security and cybersecurity is crucial. Learn how continuous monitoring, penetration testing, and automated checks identify risks early.<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/360-grad-cyberrisiken\/\" aria-label=\"Read more about 360\u00b0-Sicht auf Cyberrisiken\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-26720 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/eu-cybersecurity-paket\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-13.-Maerz-2026-14_41_27-300x200.png\" class=\"attachment-medium size-medium wp-image-27228\" alt=\"\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-13.-Maerz-2026-14_41_27-300x200.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-13.-Maerz-2026-14_41_27-1024x683.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-13.-Maerz-2026-14_41_27-768x512.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-13.-Maerz-2026-14_41_27-18x12.png 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-13.-Maerz-2026-14_41_27.png 1536w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/eu-cybersecurity-paket\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tEU Cybersecurity Package 2026\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 5, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>On January 20, the EU Commission presented its new EU Cybersecurity Package 2026. What at first glance appears to be a further regulatory adjustment actually marks\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/eu-cybersecurity-paket\/\" aria-label=\"Read more about EU Cybersecurity Paket 2026\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-26509 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-ihk-siegen tag-schwachstellen tag-sicherheitsluecken tag-webinar\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/realitaetscheck\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/02\/ki-bild-erstellen.de-Cybersicherheit-Z-300x171.png\" class=\"attachment-medium size-medium wp-image-26518\" alt=\"DEFENDERBOX - NEWS IT SECURITY AUDIT 2\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/02\/ki-bild-erstellen.de-Cybersicherheit-Z-300x171.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/02\/ki-bild-erstellen.de-Cybersicherheit-Z-1024x585.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/02\/ki-bild-erstellen.de-Cybersicherheit-Z-768x439.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/02\/ki-bild-erstellen.de-Cybersicherheit-Z-18x10.png 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/02\/ki-bild-erstellen.de-Cybersicherheit-Z.png 1344w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/realitaetscheck\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tBetween a sense of security &amp; facts\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 19, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Many companies feel secure - but the reality is often different. Cyber attacks are becoming increasingly sophisticated, faster and more targeted. To achieve true digital resilience\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/realitaetscheck\/\" aria-label=\"Read more about Zwischen Sicherheitsgef\u00fchlt &amp; Fakten\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-25817 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-ihk-siegen tag-schwachstellen tag-sicherheitsluecken tag-webinar\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/cybersecurity-2026\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog-300x171.webp\" class=\"attachment-medium size-medium wp-image-26435\" alt=\"DEFENDERBOX - TITLE NEWS - CYBERSEC BLOG\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog-300x171.webp 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog-1024x585.webp 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog-768x439.webp 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog-18x10.webp 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/Cybersec-Blog.webp 1344w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/cybersecurity-2026\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tCybersecurity 2026\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 29, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Cybersecurity will no longer be an IT issue in 2026 - it will be strategic risk management. If you know your \u201ebusiness blast radius\u201c, you can actively limit damage.<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/cybersecurity-2026\/\" aria-label=\"Read more about Cybersecurity 2026\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-25649 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-ihk-siegen tag-schwachstellen tag-sicherheitsluecken tag-webinar\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/rueckblick2025\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/ki-bild-erstellen.de-Rueckblick-auf-IT--300x171.png\" class=\"attachment-medium size-medium wp-image-25655\" alt=\"DEFENDERBOX - Review of IT security, News 2025\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/ki-bild-erstellen.de-Rueckblick-auf-IT--300x171.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/ki-bild-erstellen.de-Rueckblick-auf-IT--1024x585.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/ki-bild-erstellen.de-Rueckblick-auf-IT--768x439.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/ki-bild-erstellen.de-Rueckblick-auf-IT--18x10.png 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2026\/01\/ki-bild-erstellen.de-Rueckblick-auf-IT-.png 1344w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/rueckblick2025\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tReview of IT security 2025\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 15, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>2025 was an intense year for IT and information security: attacks became more diverse and more professional, and companies, authorities and security teams had to rethink their strategies in order to keep pace.\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/rueckblick2025\/\" aria-label=\"Read more about Review of IT security 2025\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-18929 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/xmas\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/ki-bild-erstellen.de-Frohe-Weihnachten-300x171.jpg\" class=\"attachment-medium size-medium wp-image-25320\" alt=\"Relaxed Christmas while DEFENDERBOX works for you.\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/ki-bild-erstellen.de-Frohe-Weihnachten-300x171.jpg 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/ki-bild-erstellen.de-Frohe-Weihnachten-1024x585.jpg 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/ki-bild-erstellen.de-Frohe-Weihnachten-768x439.jpg 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/ki-bild-erstellen.de-Frohe-Weihnachten-18x10.jpg 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/12\/ki-bild-erstellen.de-Frohe-Weihnachten.jpg 1344w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/xmas\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tMerry Christmas and a cyber-safe New Year\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 19, 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Merry Christmas and a Happy New Year<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/xmas\/\" aria-label=\"Read more about Merry Christmas and a cyber-safe New Year\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-25311 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-ihk-siegen tag-schwachstellen tag-sicherheitsluecken tag-webinar\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/cyber-versicherung\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/11\/ki-bild-erstellen.de-Cyber-Versicherun-300x171.jpg\" class=\"attachment-medium size-medium wp-image-25315\" alt=\"DEFENDERBOX - all-in-one managed security platform\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/11\/ki-bild-erstellen.de-Cyber-Versicherun-300x171.jpg 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/11\/ki-bild-erstellen.de-Cyber-Versicherun-1024x585.jpg 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/11\/ki-bild-erstellen.de-Cyber-Versicherun-768x439.jpg 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/11\/ki-bild-erstellen.de-Cyber-Versicherun-18x10.jpg 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/11\/ki-bild-erstellen.de-Cyber-Versicherun.jpg 1344w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/cyber-versicherung\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tCyber insurance?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tNovember 27, 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Cyber insurance is important - but not an excuse for negligence. A policy is no substitute for good cyber defense.<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/cyber-versicherung\/\" aria-label=\"Read more about Cyber insurance?\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-17609 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-ihk-siegen tag-schwachstellen tag-sicherheitsluecken tag-webinar\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/ransomware\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-300x300.png\" class=\"attachment-medium size-medium wp-image-17611\" alt=\"Ransomware is a lucrative cyber scam\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-300x300.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-1024x1024.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-150x150.png 150w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-768x768.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-1000x1000.png 1000w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-280x280.png 280w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-560x560.png 560w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-600x600.png 600w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12-800x800.png 800w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/09\/NIS2-SocialMedia-8Typesof_0.12.png 1080w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/ransomware\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tWhy cybersecurity is now a priority\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tNovember 11, 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Over 50% of German companies have already fallen victim to ransomware. Around one in eight affected companies has responded to financial demands.<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/ransomware\/\" aria-label=\"Read more about Why cybersecurity is now a priority\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-13227 post type-post status-publish format-standard has-post-thumbnail hentry category-netzwerksicherheit-mit-defenderbox tag-cyberlage tag-cyberresilienz tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/3-schritte\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/07\/KI-Bild-erstellen.de-drei-schritte-zu--300x171.png\" class=\"attachment-medium size-medium wp-image-13228\" alt=\"Cyber threats are becoming increasingly complex and sophisticated. Protect yourself!\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/07\/KI-Bild-erstellen.de-drei-schritte-zu--300x171.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/07\/KI-Bild-erstellen.de-drei-schritte-zu--1024x585.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/07\/KI-Bild-erstellen.de-drei-schritte-zu--768x439.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/07\/KI-Bild-erstellen.de-drei-schritte-zu--1000x571.png 1000w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/07\/KI-Bild-erstellen.de-drei-schritte-zu--980x560.png 980w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/07\/KI-Bild-erstellen.de-drei-schritte-zu--600x343.png 600w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/07\/KI-Bild-erstellen.de-drei-schritte-zu-.png 1344w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/3-schritte\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tThree steps to more cyber security\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tNovember 6, 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>The ever-changing threat landscape is a labyrinth of hidden communication channels and constantly evolving tactics. Keep up and optimize your cyber resilience. Here\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/3-schritte\/\" aria-label=\"Read more about Three steps to more cyber security\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-24748 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/phishing-erkennen\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"300\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30-200x300.png\" class=\"attachment-medium size-medium wp-image-24752\" alt=\"Detect phishing scams with DEFENDERBOX and Phishing.io\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30-200x300.png 200w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30-683x1024.png 683w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30-768x1152.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30-8x12.png 8w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png 1024w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/phishing-erkennen\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tRecognize phishing scams...\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tOctober 30, 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Phishing attacks have doubled since 2024 - and with AI-supported scams, they are becoming increasingly difficult to detect. But if you (re)cognize important warning signals, you can protect yourself and\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/phishing-erkennen\/\" aria-label=\"Read more about Recognizing phishing scams...\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-24594 post type-post status-publish format-standard has-post-thumbnail hentry category-neues-auf-der-cyberfront tag-cyberlage tag-cybersecurity tag-cybersicherheit tag-hackerangriffe tag-it-sicherheit tag-pentest tag-schwachstellen tag-sicherheitsluecken\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/defenderbox.de\/en\/enthus\/\" tabindex=\"-1\" target=\"&quot;_blank&quot;\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"136\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/MCL_enthus_Wortmarke_deep_blue_rgb_S_rz-300x136.png\" class=\"attachment-medium size-medium wp-image-24533\" alt=\"with enthus - Partner of DEFENDERBOX - more security for your company!\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/MCL_enthus_Wortmarke_deep_blue_rgb_S_rz-300x136.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/MCL_enthus_Wortmarke_deep_blue_rgb_S_rz-18x8.png 18w, https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/MCL_enthus_Wortmarke_deep_blue_rgb_S_rz.png 451w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/defenderbox.de\/en\/enthus\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tPartnership with enthus\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tOctober 15, 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>DEFENDERBOX enters into a partnership with enthus - that means more protection for your company!<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/defenderbox.de\/en\/enthus\/\" aria-label=\"Read more about Partnership with enthus\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<div class=\"e-load-more-anchor\" data-page=\"1\" data-max-page=\"7\" data-next-page=\"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/20172\/page\/2\/\"><\/div>\n\t\t\t\t<nav class=\"elementor-pagination\" aria-label=\"Pagination\">\n\t\t\t<span aria-current=\"page\" class=\"page-numbers current\"><span class=\"elementor-screen-only\">Page<\/span>1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/20172\/page\/2\/\"><span class=\"elementor-screen-only\">Page<\/span>2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/20172\/page\/3\/\"><span class=\"elementor-screen-only\">Page<\/span>3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/20172\/page\/4\/\"><span class=\"elementor-screen-only\">Page<\/span>4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/20172\/page\/5\/\"><span class=\"elementor-screen-only\">Page<\/span>5<\/a>\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-936e6dd e-con-full remove e-flex e-con e-parent\" data-id=\"936e6dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7d43f45 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"7d43f45\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-53f0092 e-con-full e-flex e-con e-child\" data-id=\"53f0092\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3467e7 elementor-widget elementor-widget-counter\" data-id=\"c3467e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">+<\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"100000\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"> Security scans<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3f337 elementor-widget elementor-widget-text-editor\" data-id=\"2f3f337\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>make the DEFENDERBOX trustworthy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ccc842 elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"8ccc842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/defenderbox.de\/en\/test-installation\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-calendar-check\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M436 160H12c-6.627 0-12-5.373-12-12v-36c0-26.51 21.49-48 48-48h48V12c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v52h128V12c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v52h48c26.51 0 48 21.49 48 48v36c0 6.627-5.373 12-12 12zM12 192h424c6.627 0 12 5.373 12 12v260c0 26.51-21.49 48-48 48H48c-26.51 0-48-21.49-48-48V204c0-6.627 5.373-12 12-12zm333.296 95.947l-28.169-28.398c-4.667-4.705-12.265-4.736-16.97-.068L194.12 364.665l-45.98-46.352c-4.667-4.705-12.266-4.736-16.971-.068l-28.397 28.17c-4.705 4.667-4.736 12.265-.068 16.97l82.601 83.269c4.667 4.705 12.265 4.736 16.97.068l142.953-141.805c4.705-4.667 4.736-12.265.068-16.97z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">TEST NOW<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>NEWS Protect your company - simply, quickly and cyber-securely with the DEFENDERBOX! + 0 security scans make the DEFENDERBOX trustworthy. TEST NOW<\/p>","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-20172","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>News - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"Alle Neuigkeiten rund um DEFENDERBOX: Aktuelle News, Produkt-Updates und Tipps rund um das Thema Cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/news\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"News - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"Alle Neuigkeiten rund um DEFENDERBOX: Aktuelle News, Produkt-Updates und Tipps rund um das Thema Cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/news\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-02T20:53:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/news\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/news\\\/\",\"name\":\"News - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"datePublished\":\"2025-03-03T21:56:02+00:00\",\"dateModified\":\"2026-03-02T20:53:58+00:00\",\"description\":\"Alle Neuigkeiten rund um DEFENDERBOX: Aktuelle News, Produkt-Updates und Tipps rund um das Thema Cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/news\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/news\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/news\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"News - DEFENDERBOX","description":"All the latest news about DEFENDERBOX: current news, product updates and tips on cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/news\/","og_locale":"en_US","og_type":"article","og_title":"News - DEFENDERBOX","og_description":"Alle Neuigkeiten rund um DEFENDERBOX: Aktuelle News, Produkt-Updates und Tipps rund um das Thema Cybersecurity.","og_url":"https:\/\/defenderbox.de\/en\/news\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_modified_time":"2026-03-02T20:53:58+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/news\/","url":"https:\/\/defenderbox.de\/news\/","name":"News - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"datePublished":"2025-03-03T21:56:02+00:00","dateModified":"2026-03-02T20:53:58+00:00","description":"All the latest news about DEFENDERBOX: current news, product updates and tips on cybersecurity.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/news\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/news\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/news\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"News"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/20172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=20172"}],"version-history":[{"count":1,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/20172\/revisions"}],"predecessor-version":[{"id":26923,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/20172\/revisions\/26923"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=20172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}