{"id":1088,"date":"2014-02-18T18:31:34","date_gmt":"2014-02-18T16:31:34","guid":{"rendered":"http:\/\/blog.patricksauer.net\/?p=1088"},"modified":"2014-02-18T18:32:11","modified_gmt":"2014-02-18T16:32:11","slug":"newsletter-83-der-sicherheitsexperten-sind-beunruhigt-mit-schwachstellenscans-nicht-alle-bedrohungen-zu-finden","status":"publish","type":"post","link":"https:\/\/security.sauer.ninja\/de\/it-sicherheit\/newsletter-83-der-sicherheitsexperten-sind-beunruhigt-mit-schwachstellenscans-nicht-alle-bedrohungen-zu-finden\/","title":{"rendered":"Newsletter: 83% der Sicherheitsexperten sind beunruhigt, mit Schwachstellenscans nicht alle Bedrohungen zu finden"},"content":{"rendered":"<p>Heute kam ein Newsletter von Tenable in mein Postfach. Betreff: \u201e<strong>83% of Security Pros are concerned about missing threats between vulnerability scans.<\/strong>\u201d Jetzt ernsthaft? Und was denken die restlichen 17% der Sicherheitsexperten in der Umfrage? Dass man mit Schwachstellenscans tats\u00e4chlich alle Bedrohungen in der IT-Sicherheit findet? Ja ne, ist klar\u2026 Der Betreff h\u00e4tte hei\u00dfen m\u00fcssen \u201e<strong>100% of Security Pros are thinking that vulnerability scans won\u2019t find all threats.<\/strong>\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Heute kam ein Newsletter von Tenable in mein Postfach. Betreff: \u201e83% of Security Pros are concerned about missing threats between vulnerability scans.\u201d Jetzt ernsthaft? Und was denken die restlichen 17% der Sicherheitsexperten in der Umfrage? Dass man mit Schwachstellenscans tats\u00e4chlich alle Bedrohungen in der IT-Sicherheit findet? Ja ne, ist klar\u2026 Der Betreff h\u00e4tte hei\u00dfen m\u00fcssen &#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/security.sauer.ninja\/de\/it-sicherheit\/newsletter-83-der-sicherheitsexperten-sind-beunruhigt-mit-schwachstellenscans-nicht-alle-bedrohungen-zu-finden\/\">[Read more&#8230;]<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[126,139,140],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-psauer","4":"post-1088","6":"format-standard","7":"category-it-sicherheit","8":"post_tag-nessus","9":"post_tag-schwachstellenscans","10":"post_tag-vulnerability-scan"},"_links":{"self":[{"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/posts\/1088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/comments?post=1088"}],"version-history":[{"count":3,"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/posts\/1088\/revisions"}],"predecessor-version":[{"id":1091,"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/posts\/1088\/revisions\/1091"}],"wp:attachment":[{"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/media?parent=1088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/categories?post=1088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security.sauer.ninja\/de\/wp-json\/wp\/v2\/tags?post=1088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}