[{"data":1,"prerenderedAt":74},["ShallowReactive",2],{"seo-global":3,"seo-page-insights":-1,"_seo_bundle":15,"insight-categories":16,"insights":36},{"id":4,"site_name":5,"site_url":6,"default_og_image":6,"google_verification":6,"bing_verification":6,"org_name":5,"org_description_de":6,"org_description_en":6,"org_address":7,"org_city":8,"org_postal_code":9,"org_country":10,"org_phone":11,"org_email":12,"org_founding_year":6,"social_twitter":6,"social_linkedin":6,"social_instagram":6,"social_facebook":6,"social_xing":6,"updated_at":13,"contact_ampel":14},1,"DH Agentur","","An der Stadtgärtnerei 47","Wesel","46485","DE","+4915901078280","dennish@dhagentur.de","2026-04-06 22:44:49","green",null,[17,21,25,28,32],{"key":18,"label_de":19,"label_en":20},"security","Sicherheit","Security",{"key":22,"label_de":23,"label_en":24},"webdev","Webentwicklung","Web Development",{"key":26,"label_de":27,"label_en":27},"marketing","Marketing",{"key":29,"label_de":30,"label_en":31},"ai","KI & Automatisierung","AI & Automation",{"key":33,"label_de":34,"label_en":35},"strategy","Strategie","Strategy",[37,51,63],{"slug":38,"title":39,"titleEn":6,"description":40,"descriptionEn":6,"date":41,"author":42,"authorSlug":42,"category":18,"tags":43,"image":6,"readingTime":49,"aiGenerated":50},"effektive-strategien-zur-absicherung-ihrer-software-gegen-aktuelle-bedrohungen","Effektive Strategien zur Absicherung Ihrer Software gegen aktuelle Bedrohungen","In der heutigen digitalen Welt ist die Absicherung von Software gegen Bedrohungen unerlässlich. Dieser Artikel beleuchtet effektive Strategien, um Ihre Software vor den neuesten Cyber-Bedrohungen zu schützen und Sicherheitslücken zu schließen.","2026-04-07","dennis-henne",[44,45,46,47,48],"Software-Sicherheit","Cyber-Bedrohungen","Sicherheitsstrategien","IT-Schutz","Software-Absicherung",4,true,{"slug":52,"title":53,"titleEn":6,"description":54,"descriptionEn":6,"date":55,"author":42,"authorSlug":42,"category":26,"tags":56,"image":6,"readingTime":62,"aiGenerated":50},"praxisleitfaden-firewall-implementierung-nach-dem-juengsten-eu-cloud-angriff","Praxisleitfaden: Firewall-Implementierung nach dem jüngsten EU-Cloud-Angriff","Der Artikel liefert einen praxisnahen Leitfaden zur Implementierung von Firewalls nach dem jüngsten EU-Cloud-Angriff. Er erklärt Planung, Konfiguration und Testverfahren und gibt Tipps zur Einhaltung gesetzlicher Vorgaben.","2026-03-28",[57,58,59,60,61],"Firewall","EU-Cloud-Angriff","Sicherheitsleitfaden","Netzwerksicherheit","Compliance",6,{"slug":64,"title":65,"titleEn":6,"description":66,"descriptionEn":6,"date":55,"author":5,"authorSlug":6,"category":29,"tags":67,"image":6,"readingTime":73,"aiGenerated":50},"cloud-sicherheitsstrategien-2024-schutz-vor-staatlich-unterstuetzten-angriffen","Cloud‑Sicherheitsstrategien 2024: Schutz vor staatlich unterstützten Angriffen","Der Artikel zeigt praxisnahe Strategien, um Cloud‑Umgebungen vor staatlich geförderten Cyberbedrohungen zu sichern. Er behandelt präventive Maßnahmen, moderne Erkennungstechniken und effektive Reaktionspläne für 2024.",[68,69,70,71,72],"Cloud Security","Staatliche Angriffe","Cybersecurity 2024","Prävention","Incident Response",5,1775527586057]