{"id":17028,"date":"2021-10-21T11:04:42","date_gmt":"2021-10-21T09:04:42","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/uncategorized\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/"},"modified":"2021-10-27T11:05:38","modified_gmt":"2021-10-27T09:05:38","slug":"from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget","status":"publish","type":"post","link":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/","title":{"rendered":"From theory to practice: planning cyber security efficiently and according to budget"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-10w0ne-83275210999af2721c3b7a850c3db44d entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-51e084b814d6b4cc15f972273d333894\">\n.flex_cell.av-jumkwvcm-51e084b814d6b4cc15f972273d333894{\nvertical-align:middle;\nheight:200px;\nmin-height:200px;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-51e084b814d6b4cc15f972273d333894{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-51e084b814d6b4cc15f972273d333894 av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-c03b457ab9760610044e5d1acd2550fb\">\n.flex_cell.av-jumkxgop-c03b457ab9760610044e5d1acd2550fb{\nvertical-align:top;\nheight:200px;\nmin-height:200px;\nbackground-color:#d4310f;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-c03b457ab9760610044e5d1acd2550fb{\npadding:80px 80px 80px 80px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-c03b457ab9760610044e5d1acd2550fb av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d\">\n#top .av-special-heading.av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kv0y1iln-5a6db3ffd3bf56321c84088b5449fc2d av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >From theory to practice: planning cyber security efficiently and according to budget<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2\">\n#top .av_textblock_section.av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" >21. October, 2021\n<\/div><\/section><\/p>\n<\/div><\/div><\/div><div id='av-layout-grid-2'  class='av-layout-grid-container av-10w0ne-946d652e60d0b6ad208db73a875431fa entry-content-wrapper main_color av-fixed-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_textblock  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec\">\n.flex_cell.av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec{\nvertical-align:top;\nbackground-color:#ac1502;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec av-gridrow-cell av_one_half no_margin  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0\">\n.flex_cell.av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0 av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div><div id='after_grid_row_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17028'><div class='entry-content-wrapper clearfix'><\/p>\n<section  class='av_textblock_section av-jy8jdxp7-9ff79eb1cb6968faa664cfc107561678 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Incorporate practice, cyber security is not only a question of suitable technology or the current threat situation but primarily a question of resources. The starting point is usually the existing IT (security) budget.<\/h3>\n<p>Financial resources earmarked for cybersecurity largely determine how best to balance increasing threat scenarios and limited capacity. At least up to the first incident, the budget is usually quite limited.<\/p>\n<p>Human resources for cybersecurity are limited \u2013 planning uncertainty and high personnel costs are the results. Therefore, companies often have to ask themselves which measures they should prioritize and which ones they should supervise in-house and which ones they want to outsource.<\/p>\n<h3><a href=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-17006\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21-300x200.jpg\" alt=\"Christian Fritz - Loipersdorf 2021\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21-300x200.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21-768x512.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21-705x470.jpg 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Operate cyber security in-house or outsource it<\/h3>\n<blockquote>\n<p>&#8220;The question of the extent to which security can be outsourced is quickly answered: theoretically, entirely,&#8221; says IKARUS COO Christian Fritz, who led a workshop on this topic with 25 IT managers at this year&#8217;s LSZ CIO Congress, summarizing the results of the discussion: &#8220;The only essential thing is to define the framework conditions precisely in advance. In the event of an incident, speed is of the essence. This means that external managers need some decision-making power if no coordination is possible &#8211; because attacks don&#8217;t just happen on weekdays from 9 to 5.&#8221;<\/p>\n<\/blockquote>\n<p>The first step towards an adapted security action plan is to select the topics covered with the existing budget. Based on practical experience, it is advisable to choose projects that enable rapid progress and effectively raise the level of safety.<\/p>\n<p>\u201cMany companies only come when they already see themselves in the focus of possible attacks \u2013 as we have seen with the current ransomware wave\u201d, reports Christian Fritz: \u201cWe recommend a focus on measures that can be implemented quickly and bring added value to their awareness. This can be an EDR \u2013 Endpoint Detection and Response \u2013 solution that also displays alarms from other areas and thus facilitates the response to a wide range of security incidents. Those who work with operational technologies or IoT systems will quickly benefit from passive solutions that create a dynamic asset inventory almost at the push of a button and continuously scan the entire network for vulnerabilities, threats and anomalies.&#8221;<\/p>\n<h3>Cyber security measures for IT and OT systems<\/h3>\n<p>In IT, most threats come from the endpoints \u2013 PCs, laptops, or mobile devices used to surf, download and retrieve e-mails. \u201cWe users are the classic vulnerability in IT\u201d, says Christian Fritz: \u201cIn most cases, a successful attack is preceded by careless user interaction. Repeated awareness training and hints can catch a lot \u2013 similar to the current program and system updates in systems technology. But there are attacks that the trained user can detect. No longer visible \u2013 the security software has to sound the alarm.\u201d<\/p>\n<p>In OT, there are machines with countless protocols and different update or patch statuses instead of users. With the digitization of industry, IT meets OT, legacy meets bleeding edge, and unsecured operational technology meets threats from IT.<\/p>\n<p>&#8220;To be able to secure your existing assets and systems against attacks from IT, you first need to know what you have,&#8221; explains Christian Fritz: &#8220;The state of the art is non-intrusive technologies that scan your network passively. The system learns about normal network traffic, and of course, individual variables and thresholds can be defined. And it allows you to secure assets via vulnerability and malware scans without having, to access the devices and systems directly.\u201d<\/p>\n<h3>Building up know-how for your own company<\/h3>\n<p>When selecting a suitable technology and provider, paying attention to available service and support is advisable. &#8220;Especially when working with new technologies, building up know-how is extremely important,&#8221; says Christian Fritz: &#8220;Software should make daily work easier, more secure and efficient, but not tie up additional resources.&#8221;<\/p>\n<p>IKARUS Security Software operates both in-house developed security solutions and technologies from selected partner companies in its own Scan Center in Vienna. &#8220;All of the solutions we offer have been intensively tested by us and have convinced us in in-house use,&#8221; says Christian Fritz: &#8220;We pass on our theoretical and practical experience and expertise to our customers &#8211; to the exact extent desired.<\/p>\n<p><em>Do you have questions about cybersecurity? Are you looking for advice on the efficient implementation of your security measures, or would you like to experience selected solutions live? Contact us at +43 1 58995-500 or <a href=\"mailto:sales@ikarus.at\">sales@ikarus.at<\/a>!<\/em><\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4\">\n#top .hr.hr-invisible.av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4 hr-invisible  avia-builder-el-9  el_after_av_textblock  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div  class='avia-button-wrap av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee-wrap avia-button-left  avia-builder-el-10  el_after_av_hr  el_before_av_postslider '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee\">\n#top #wrap_all .avia-button.av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee{\nbackground-color:#0993ba;\nborder-color:#0993ba;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.ikarussecurity.com\/en\/security-news\/newsletter\/'  class='avia-button av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee av-link-btn avia-icon_select-no avia-size-small avia-position-left'   aria-label=\"Security tips conveniently in your inbox: Subscribe to IKARUS News now\"><span class='avia_iconbox_title' >Security tips conveniently in your inbox: Subscribe to IKARUS News now<\/span><\/a><\/div>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-11  el_after_av_button  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44708 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' data-rel='slide-1' class='slide-image' title='Cyber Threats in Europe'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025--260x185.png\" class=\"wp-image-44704 avia-img-lazy-loading-not-44704 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"ENISA Threat Landscape Report 2025\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cyber Threats in Europe\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' title='Cyber Threats in Europe'>Cyber Threats in Europe<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-10T10:49:24+01:00\" >10. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025-.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>424<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2026-03-10 10:49:24<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-10 11:06:01<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cyber Threats in Europe<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44622 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' data-rel='slide-1' class='slide-image' title='New Company Name and New Office Address as of March 1, 2026'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"84\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-260x84.png\" class=\"wp-image-44613 avia-img-lazy-loading-not-44613 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS Security\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New Company Name and New Office Address as of March 1, 2026\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' title='New Company Name and New Office Address as of March 1, 2026'>New Company Name and New Office Address as of March 1, 2026<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-02T10:06:20+01:00\" >2. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>84<\/span>\n\t\t\t\t\t\t<span itemprop='width'>350<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2026-03-02 10:06:20<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-02 10:06:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New Company Name and New Office Address as of March 1, 2026<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44362 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' data-rel='slide-1' class='slide-image' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-260x185.png\" class=\"wp-image-44368 avia-img-lazy-loading-not-44368 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"BSI-Certification\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: BSI-certified EDR agent for HarfangLab Guard feat. IKARUS\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-02-02T16:12:31+01:00\" >2. February 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>753<\/span>\n\t\t\t\t\t\t<span itemprop='width'>752<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2026-02-02 16:12:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-02-02 16:18:51<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44284 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' data-rel='slide-1' class='slide-image' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg\" class=\"wp-image-35536 avia-img-lazy-loading-not-35536 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"HarfangLab Guard\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-300x214.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg 400w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Austrian Universities Move Toward European Endpoint Security with Data Sovereignty\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T11:45:07+01:00\" >27. January 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>285<\/span>\n\t\t\t\t\t\t<span itemprop='width'>400<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2026-01-27 11:45:07<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-01-27 11:47:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44159 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' data-rel='slide-1' class='slide-image' title='Attack Surface Management (ASM)'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-260x185.jpg\" class=\"wp-image-44156 avia-img-lazy-loading-not-44156 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Attack Surface Management (ASM)\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-600x430.jpg 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Attack Surface Management (ASM)\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' title='Attack Surface Management (ASM)'>Attack Surface Management (ASM)<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-09T11:49:31+01:00\" >9. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>467<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-12-09 11:49:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-09 11:49:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Attack Surface Management (ASM)<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44134 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' data-rel='slide-1' class='slide-image' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-260x185.jpg\" class=\"wp-image-44018 avia-img-lazy-loading-not-44018 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS CEO Joe Pichlmayr and Gr\u00e9goire Germain\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-03T11:57:52+01:00\" >3. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1281<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1920<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-12-03 11:57:52<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-03 11:57:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43945 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' data-rel='slide-1' class='slide-image' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png\" class=\"wp-image-43850 avia-img-lazy-loading-not-43850 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"NOZOMI EMEA MSSP Award 2025\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png 595w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-24T12:36:31+01:00\" >24. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>420<\/span>\n\t\t\t\t\t\t<span itemprop='width'>595<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43752 slide-entry-overview slide-loop-8 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' data-rel='slide-1' class='slide-image' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general-260x185.jpg\" class=\"wp-image-43747 avia-img-lazy-loading-not-43747 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"ASCON: Neuer NIST-Standard f\u00fcr leichtgewichtige IoT-Kryptografie\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ASCON: New NIST Standard for Lightweight IoT Cryptography\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-07T11:46:41+01:00\" >7. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>260<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-11-07 11:46:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-07 11:46:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-43212 slide-entry-overview slide-loop-9 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/the-interaction-between-firewall-and-email-security\/' data-rel='slide-1' class='slide-image' title='The Interaction Between Firewall and Email Security'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/mail-security-firewall-260x185.jpg\" class=\"wp-image-43202 avia-img-lazy-loading-not-43202 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Zusammenspiel von Firewall und E-Mail Security\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The Interaction Between Firewall and Email Security\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/the-interaction-between-firewall-and-email-security\/' title='The Interaction Between Firewall and Email Security'>The Interaction Between Firewall and Email Security<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-06T16:04:08+02:00\" >6. October 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/mail-security-firewall.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-10-06 16:04:08<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-10-06 16:04:08<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The Interaction Between Firewall and Email Security<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-42739 slide-entry-overview slide-loop-10 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/customer-information-acquisition-of-nozomi-networks-by-mitsubishi-electric\/' data-rel='slide-1' class='slide-image' title='Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/09\/Mitsubishi_Electric-Nozomi-260x185.png\" class=\"wp-image-42736 avia-img-lazy-loading-not-42736 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Mitsubishi Electric-Nozomi\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/customer-information-acquisition-of-nozomi-networks-by-mitsubishi-electric\/' title='Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric'>Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-10T14:06:59+02:00\" >10. September 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/09\/Mitsubishi_Electric-Nozomi.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-09-10 14:06:59<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-09-10 14:07:00<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-42542 slide-entry-overview slide-loop-11 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/watering-hole-attacks-how-they-work-the-risks-and-protection-strategies\/' data-rel='slide-1' class='slide-image' title='Watering Hole Attacks: How They Work, the Risks, and Protection Strategies'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/08\/WildeTiere-Wasserloch-600-260x185.jpg\" class=\"wp-image-42537 avia-img-lazy-loading-not-42537 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Watering Hole Attacks\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Watering Hole Attacks: How They Work, the Risks, and Protection Strategies\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/watering-hole-attacks-how-they-work-the-risks-and-protection-strategies\/' title='Watering Hole Attacks: How They Work, the Risks, and Protection Strategies'>Watering Hole Attacks: How They Work, the Risks, and Protection Strategies<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-08-13T11:17:17+02:00\" >13. August 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/08\/WildeTiere-Wasserloch-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-08-13 11:17:17<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-08-13 11:17:19<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Watering Hole Attacks: How They Work, the Risks, and Protection Strategies<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-42354 slide-entry-overview slide-loop-12 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/legacy-systems-how-outdated-hardware-and-software-threaten-corporate-security\/' data-rel='slide-1' class='slide-image' title='Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Computerhardware-aus-den-80ern-auf-einem-Mistplatz-260x185.jpg\" class=\"wp-image-42458 avia-img-lazy-loading-not-42458 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Legacy Systems\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Computerhardware-aus-den-80ern-auf-einem-Mistplatz-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Computerhardware-aus-den-80ern-auf-einem-Mistplatz-600x430.jpg 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/legacy-systems-how-outdated-hardware-and-software-threaten-corporate-security\/' title='Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security'>Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-07-24T13:18:21+02:00\" >24. July 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Computerhardware-aus-den-80ern-auf-einem-Mistplatz.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>467<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-07-24 13:18:21<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-07-29 11:09:50<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-42269 slide-entry-overview slide-loop-13 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/zero-day-vulnerability-in-windows-shortcuts\/' data-rel='slide-1' class='slide-image' title='Zero-Day Vulnerability in Windows Shortcuts'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Windows-Zero-Day-260x185.jpg\" class=\"wp-image-42264 avia-img-lazy-loading-not-42264 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Windows Zero-Day Vulnerability\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Zero-Day Vulnerability in Windows Shortcuts\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/zero-day-vulnerability-in-windows-shortcuts\/' title='Zero-Day Vulnerability in Windows Shortcuts'>Zero-Day Vulnerability in Windows Shortcuts<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-07-10T13:23:13+02:00\" >10. July 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Windows-Zero-Day.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>607<\/span>\n\t\t\t\t\t\t<span itemprop='width'>800<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-07-10 13:23:13<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-07-10 13:23:15<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Zero-Day Vulnerability in Windows Shortcuts<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-41786 slide-entry-overview slide-loop-14 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/owasp-top-10-for-llms-new-security-challenges-due-to-ai\/' data-rel='slide-1' class='slide-image' title='OWASP Top 10 for LLMs: New Security Challenges due to AI'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"166\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/OWASP-Top-10-260x166.jpg\" class=\"wp-image-41783 avia-img-lazy-loading-not-41783 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"OWASP Top 10 f\u00fcr LLMs\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: OWASP Top 10 for LLMs: New Security Challenges due to AI\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/owasp-top-10-for-llms-new-security-challenges-due-to-ai\/' title='OWASP Top 10 for LLMs: New Security Challenges due to AI'>OWASP Top 10 for LLMs: New Security Challenges due to AI<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-06-18T14:37:55+02:00\" >18. June 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/OWASP-Top-10.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>166<\/span>\n\t\t\t\t\t\t<span itemprop='width'>304<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-06-18 14:37:55<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:03:57<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>OWASP Top 10 for LLMs: New Security Challenges due to AI<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-41615 slide-entry-overview slide-loop-15 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-malware-scanner-now-part-of-heise-desinfect\/' data-rel='slide-1' class='slide-image' title='IKARUS malware.scanner now part of Heise Desinfec\u2019t'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/Desinfect2025-260x185.png\" class=\"wp-image-41634 avia-img-lazy-loading-not-41634 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS malware.scanner now part of Heise Desinfec\u2019t\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-malware-scanner-now-part-of-heise-desinfect\/' title='IKARUS malware.scanner now part of Heise Desinfec\u2019t'>IKARUS malware.scanner now part of Heise Desinfec\u2019t<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-06-11T15:03:11+02:00\" >11. June 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/Desinfect2025.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>524<\/span>\n\t\t\t\t\t\t<span itemprop='width'>971<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-06-11 15:03:11<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:05:43<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS malware.scanner now part of Heise Desinfec\u2019t<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-41179 slide-entry-overview slide-loop-16 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/microsoft-enforces-dmarc-new-delivery-rules-for-high-volume-outlook-emails\/' data-rel='slide-1' class='slide-image' title='Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/05\/e-Mail-Laptop-600-260x185.jpg\" class=\"wp-image-41170 avia-img-lazy-loading-not-41170 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Microsoft erzwingt DMARC\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/microsoft-enforces-dmarc-new-delivery-rules-for-high-volume-outlook-emails\/' title='Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails'>Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-05-06T11:22:27+02:00\" >6. May 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/05\/e-Mail-Laptop-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>300<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-10-21T11:04:42+02:00\" >2025-05-06 11:22:27<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:06:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-17' aria-describedby='av-svg-desc-17' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-17'>Previous<\/title>\n<desc id='av-svg-desc-17'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-18' aria-describedby='av-svg-desc-18' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-18'>Next<\/title>\n<desc id='av-svg-desc-18'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":17006,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101,75,102,43],"tags":[],"class_list":["post-17028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-en","category-it-security-en","category-network-security-en","category-security-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From theory to practice: planning cyber security efficiently and according to budget - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From theory to practice: planning cyber security efficiently and according to budget - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-21T09:04:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-27T09:05:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IKARUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IKARUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/\"},\"author\":{\"name\":\"IKARUS\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/person\\\/19cc5cb758c73750a975662a88135e57\"},\"headline\":\"From theory to practice: planning cyber security efficiently and according to budget\",\"datePublished\":\"2021-10-21T09:04:42+00:00\",\"dateModified\":\"2021-10-27T09:05:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/\"},\"wordCount\":1275,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Christian-Fritz-Loipersdorf21.jpg\",\"articleSection\":[\"Events\",\"IT Security\",\"Network Security\",\"Security news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/\",\"name\":\"From theory to practice: planning cyber security efficiently and according to budget - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Christian-Fritz-Loipersdorf21.jpg\",\"datePublished\":\"2021-10-21T09:04:42+00:00\",\"dateModified\":\"2021-10-27T09:05:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Christian-Fritz-Loipersdorf21.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Christian-Fritz-Loipersdorf21.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Christian Fritz - Loipersdorf 2021\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From theory to practice: planning cyber security efficiently and according to budget\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/person\\\/19cc5cb758c73750a975662a88135e57\",\"name\":\"IKARUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"caption\":\"IKARUS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From theory to practice: planning cyber security efficiently and according to budget - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/","og_locale":"en_US","og_type":"article","og_title":"From theory to practice: planning cyber security efficiently and according to budget - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_published_time":"2021-10-21T09:04:42+00:00","article_modified_time":"2021-10-27T09:05:38+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21.jpg","type":"image\/jpeg"}],"author":"IKARUS","twitter_card":"summary_large_image","twitter_creator":"@ikarusantivirus","twitter_site":"@ikarusantivirus","twitter_misc":{"Written by":"IKARUS","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/#article","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/"},"author":{"name":"IKARUS","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57"},"headline":"From theory to practice: planning cyber security efficiently and according to budget","datePublished":"2021-10-21T09:04:42+00:00","dateModified":"2021-10-27T09:05:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/"},"wordCount":1275,"publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21.jpg","articleSection":["Events","IT Security","Network Security","Security news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/","url":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/","name":"From theory to practice: planning cyber security efficiently and according to budget - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21.jpg","datePublished":"2021-10-21T09:04:42+00:00","dateModified":"2021-10-27T09:05:38+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21.jpg","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/10\/Christian-Fritz-Loipersdorf21.jpg","width":1000,"height":667,"caption":"Christian Fritz - Loipersdorf 2021"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/from-theory-to-practice-planning-cyber-security-efficiently-and-according-to-budget\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"From theory to practice: planning cyber security efficiently and according to budget"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]},{"@type":"Person","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57","name":"IKARUS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","caption":"IKARUS"}}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/17028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=17028"}],"version-history":[{"count":2,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/17028\/revisions"}],"predecessor-version":[{"id":17030,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/17028\/revisions\/17030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media\/17006"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=17028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/categories?post=17028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=17028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}