{"id":264,"date":"2007-12-19T19:42:06","date_gmt":"2007-12-19T17:42:06","guid":{"rendered":"http:\/\/security-planet.de\/2007\/12\/19\/so-stand-es-um-die-security-in-2007\/"},"modified":"2007-12-19T19:42:06","modified_gmt":"2007-12-19T17:42:06","slug":"so-stand-es-um-die-security-in-2007","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2007\/12\/19\/so-stand-es-um-die-security-in-2007\/","title":{"rendered":"So stand es um die Security in 2007 &#8230;"},"content":{"rendered":"<p>&#8230; und was meint Cisco zu 2008?<\/p>\n<p>Seit kurzem (zumindest ist es mir heute aufgefallen) steht im <a href=\"http:\/\/tools.cisco.com\/security\/center\/home.x\">Cisco Security Center<\/a> der <a href=\"http:\/\/www.cisco.com\/web\/about\/security\/cspo\/docs\/Cisco2007Annual_Security_Report.pdf\"><strong>Cisco 2007 Annual Security Report<\/strong><\/a> zum Download bereit.<br \/>\nCisco berichtet dabei aus den Bereichen Vulnerability, Physical, Legal, Trust, Identity, Human und Geopolitical wie die Sicherheitslage dieses Jahr war, was im n\u00e4chsten Jahr zu erwarten ist und gibt nat\u00fcrlich auch Empfehlungen, was man machen soll, um sich zu sch\u00fctzen.<\/p>\n<p>Und passend zum Thema gibt es auch von IronPort die <a href=\"http:\/\/www.ironport.com\/securitytrends\/index.html\">2008 INTERNET SECURITY TRENDS<\/a> zum Thema Spam, Virus, und Malware. Um diesen Report herunterladen zu k\u00f6nnen, mu\u00df man sich allerdings registrieren.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230; und was meint Cisco zu 2008? Seit kurzem (zumindest ist es mir heute aufgefallen) steht im Cisco Security Center der Cisco 2007 Annual Security Report zum Download bereit. Cisco berichtet dabei aus den Bereichen Vulnerability, Physical, Legal, Trust, Identity, Human und Geopolitical wie die Sicherheitslage dieses Jahr war, was im n\u00e4chsten Jahr zu erwarten <\/p>\n<div class=\"read-more-text\"><a href=\"https:\/\/cyber-fi.net\/index.php\/2007\/12\/19\/so-stand-es-um-die-security-in-2007\/\" class=\"read-more\">continue reading<\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[5,15],"tags":[321],"class_list":["post-264","post","type-post","status-publish","format-standard","hentry","category-cisco","category-security","tag-ironport"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=264"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/264\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}