{"id":1899,"date":"2019-11-11T13:29:03","date_gmt":"2019-11-11T12:29:03","guid":{"rendered":"https:\/\/ilja-schlak.de\/ilja-schlak-information-security\/"},"modified":"2025-12-16T15:30:24","modified_gmt":"2025-12-16T14:30:24","slug":"ilja-schlak-information-security","status":"publish","type":"page","link":"https:\/\/ilja-schlak.de\/en\/","title":{"rendered":"Ilja Schlak Information Security"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium color_primary with_img with_shape\"><div class=\"l-section-img\" role=\"img\" aria-label=\"IT Security\" data-img-width=\"1200\" data-img-height=\"800\" style=\"background-image: url(https:\/\/ilja-schlak.de\/wp-content\/uploads\/2019\/10\/itech-design-development.jpg);\"><\/div><div class=\"l-section-shape type_tilt pos_bottom hor_flip\" style=\"height:8vh;\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 8\" preserveAspectRatio=\"none\" width=\"100%\" height=\"100%\">\r\n\t<path fill=\"currentColor\" d=\"M64 7.9 L64 10 L0 10 L0 0 Z\"\/>\r\n<\/svg><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_medium\"><\/div><h1 class=\"w-itext us_custom_4aa92537 type_zoomInChars align_center\" style=\"--itext-transition-duration:0.0125s;--itext-timing-function:cubic-bezier(.86,0,.07,1);\" onclick='return {&quot;duration&quot;:12.5,&quot;delay&quot;:3000}'><span class=\"w-itext-part\"><span class=\"w-itext-state state-0 is-active\">Computer Science<\/span><span class=\"w-itext-state state-1\">Coding<\/span><span class=\"w-itext-state state-2\">Windows<\/span><span class=\"w-itext-state state-3\">Cloud<\/span><span class=\"w-itext-state state-4\">Hosting<\/span><span class=\"w-itext-state state-5\">Cyber Security<\/span><\/span><\/h1><div class=\"w-separator size_custom\" style=\"height:20vh\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\" id=\"blog_1\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_medium with_line width_default thick_1 style_solid color_border align_center with_text with_content\" id=\"blog_cards\"><div class=\"w-separator-h\"><h4 class=\"w-separator-text\"><a href=\"#blog_cards\" class=\"smooth-scroll\"><span>Posts<\/span><\/a><\/h4><\/div><\/div><div class=\"w-grid us_grid us_custom_a3af16e3 with_filters type_grid layout_725 cols_3 pagination_ajax overflow_hidden preload_style_spinner\" id=\"us_grid_1\" style=\"--columns:3;--gap:5px;\"><style>@media (max-width:1024px){#us_grid_1{--columns:2!important}}@media (max-width:600px){#us_grid_1{--columns:1!important}}.layout_725 .w-grid-item-h{background:var(--color-content-bg);color:var(--color-content-text);box-shadow:0 0.04rem 0.08rem rgba(0,0,0,0.1),0 0.13rem 0.4rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch .layout_725 .w-grid-item-h:hover{box-shadow:0 0.17rem 0.34rem rgba(0,0,0,0.1),0 0.57rem 1.7rem rgba(0,0,0,0.15);z-index:4}.layout_725 .usg_vwrapper_1{padding:1.5rem 2.5rem 2.5rem 2.5rem!important}.layout_725 .usg_post_title_1{font-size:1.2rem!important}.layout_725 .usg_hwrapper_2{color:var(--color-content-faded)!important;font-size:0.9rem!important}<\/style><div class=\"g-filters style_2 align_center\"><button class=\"g-filters-item active\" data-taxonomy=\"*\"><span>All<\/span><\/button><button class=\"g-filters-item\" data-taxonomy=\"it-security\" data-amount=\"3\"><span>IT Security<\/span><span class=\"g-filters-item-amount\">3<\/span><\/button><button class=\"g-filters-item\" data-taxonomy=\"news\" data-amount=\"36\"><span>News<\/span><span class=\"g-filters-item-amount\">36<\/span><\/button><\/div><div class=\"w-grid-list\" data-filter_taxonomy_name=\"category\" data-filter_default_taxonomies=\"it, it-security, news\">\t<article class=\"w-grid-item size_1x1 post-2325 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2325\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/cyberattacks-on-germany-2025\/\" aria-label=\"Cyberattacks on Germany 2025 cause record damage of 202 billion euros\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-1024x684.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"Cyberattacks on Germany 2025 cause record damage of 202 billion euros.\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-1024x684.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-200x134.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-450x301.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-350x234.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-748x500.webp 748w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025.webp 1928w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/cyberattacks-on-germany-2025\/\">Cyberattacks on Germany 2025 cause record damage of 202 billion euros<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-04-23T11:58:47+02:00\">23. April 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">Cyberattacks on Germany caused 202 billion euros in damage. The BSI Situation Report and Bitkom study 2025 identify ransomware and&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 post-2307 post type-post status-publish format-standard has-post-thumbnail hentry category-it-security\" data-id=\"2307\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/bsi-c5-2026-criteria-catalogue-cloud-computing\/\" aria-label=\"BSI C5 2026: New Criteria Catalogue for Cloud Security\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"BSI C5 2026 published: New criteria catalogue for secure cloud computing\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/BSI-C5-2026-1.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/bsi-c5-2026-criteria-catalogue-cloud-computing\/\">BSI C5 2026: New Criteria Catalogue for Cloud Security<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-109 term-it-security\" href=\"https:\/\/ilja-schlak.de\/en\/category\/it-security\/\"><span class=\"w-btn-label\">IT Security<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-04-07T19:26:26+02:00\">7. April 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">BSI C5 2026 is published! With the BSI C5 2026, Germany&#8217;s Federal Office for Information Security has released the next&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 post-2299 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2299\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/cybersecurity-market-q1-2026-record-funding\/\" aria-label=\"Cybersecurity Market Q1 2026 \u2013 Record Momentum in Funding and M&#038;A\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"The cybersecurity market Q1 2026 hit $6.3B in total activity. AI security captured 46% of capital, four new unicorns emerged, and CrowdStrike led M&amp;A.\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/cybersecurity-market-q1-2026-record-funding\/\">Cybersecurity Market Q1 2026 \u2013 Record Momentum in Funding and M&#038;A<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-04-05T20:23:03+02:00\">5. April 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The cybersecurity market Q1 2026 reached a combined $6.3 billion in strategic activity. AI security attracted 46% of all invested&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 post-2289 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2289\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/litellm-supply-chain-attack-credential-stealer\/\" aria-label=\"LiteLLM Supply Chain Attack &#8211; PyPI Packages Compromised with Credential Stealer\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"LiteLLM supply chain attack\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/litellm-supply-chain-attack-credential-stealer\/\">LiteLLM Supply Chain Attack &#8211; PyPI Packages Compromised with Credential Stealer<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-25T16:23:41+01:00\">25. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">LiteLLM supply chain attack on March 24, 2026 compromised two PyPI versions of the popular Python library with a three-stage&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 post-2275 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2275\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/trivy-supply-chain-attack-cause-timeline-cicd-impact\/\" aria-label=\"Trivy Supply Chain Attack Explained: Cause, Timeline, and CI\/CD Impact\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"Trivy Supply Chain Attack Explained: Cause, Timeline, and CI\/CD Impact\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/trivy-supply-chain-attack-cause-timeline-cicd-impact\/\">Trivy Supply Chain Attack Explained: Cause, Timeline, and CI\/CD Impact<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-22T16:20:40+01:00\">22. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The Trivy supply chain attack hit developers and CI\/CD pipelines because attackers remained inside the software supply chain after an&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 post-2265 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2265\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/it-security-market-2026-cybersecurity-strategic-importance\/\" aria-label=\"The IT Security Market in 2026 Shows Why Cybersecurity Matters More\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"The IT security market in 2026 highlights the growing strategic importance of cybersecurity. New figures from Australia and Germany show why security is becoming a higher business priority.\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/it-security-market-2026-cybersecurity-strategic-importance\/\">The IT Security Market in 2026 Shows Why Cybersecurity Matters More<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-20T10:07:28+01:00\">20. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The IT security market in 2026 confirms the strategic importance of cybersecurity The latest figures from Australia and the most&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div>\t<div class=\"w-grid-preloader\">\r\n\t\t<div class=\"g-preloader type_1\">\r\n\t\t\t<div><\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\t\t\t\t<div class=\"g-loadmore \">\r\n\t\t\t\t<div class=\"g-preloader type_1\">\r\n\t\t\t\t\t<div><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<button class=\"w-btn us-btn-style_1\">\r\n\t\t\t\t\t<span class=\"w-btn-label\">Load More<\/span>\r\n\t\t\t\t<\/button>\r\n\t\t\t<\/div>\r\n\t\t\t\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:7,&quot;pagination&quot;:&quot;ajax&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;3&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;725&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;none&quot;,&quot;overriding_link&quot;:&quot;{\\&quot;url\\&quot;:\\&quot;\\&quot;}&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;category&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;it&quot;,&quot; it-security&quot;,&quot; news&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;],&quot;ignore_sticky_posts&quot;:1,&quot;posts_per_page&quot;:&quot;6&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_post_type&quot;:&quot;post&quot;,&quot;us_grid_ajax_index&quot;:1,&quot;us_grid_filter_query_string&quot;:null,&quot;us_grid_index&quot;:1,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><div class=\"w-separator size_small\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\" id=\"blog_1\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_432d3f53\"><div class=\"wpb_wrapper\"><h2>About this blog<\/h2>\n<p>Welcome! This website offers a wide range of information and resources on information security, cybersecurity, web, IT, and digitalization. Originally created as a personal knowledge database and note portal, the blog has evolved and expanded over time.  <\/p>\n<p>Here you will find a constantly growing glossary on IT security as well as articles on various topics such as risk management, ISO 27001, cloud computing security, and web design. Whether you are an expert or an enthusiast, the blog offers you useful information and insights into the latest developments and best practices in IT security and digitalization. <\/p>\n<h3>What is the goal of this blog?<\/h3>\n<p>The blog aims to deepen the understanding of information security, cybersecurity, and digitalization in order to raise awareness of the growing importance of these topics in our increasingly connected world. In light of rapid technological advances and the increasing number of cyberattacks, it is more important than ever to address these issues. <\/p>\n<p>Today, the threat landscape is constantly growing, and cybercriminals are developing increasingly sophisticated attack methods. Therefore, it is crucial to be informed about the latest security risks and protective measures. Through the constant exchange of knowledge and experience, we can jointly shape a secure digital future. This way, we can arm ourselves against the challenges of an increasingly complex cyber landscape.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_8507d240\"><div class=\"wpb_wrapper\"><div class=\"w-image align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"450\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2021\/01\/Ilja-Schlak-FAVICON-IT-Blog.svg\" class=\"attachment-us_450_0 size-us_450_0\" alt=\"Ilja Schlak Favicon\" loading=\"lazy\" \/><\/div><\/div><div class=\"w-separator size_small\"><\/div>[vc_wp_tagcloud title=&#8221;Topic selection&#8221; taxonomy=&#8221;post_tag&#8221;]<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_small with_line width_50 thick_1 style_solid color_border align_center with_text with_content\"><div class=\"w-separator-h\"><h6 class=\"w-separator-text\"><i class=\"fas fa-laptop-code\"><\/i><span>InfoSec &#8211; Glossary<\/span><\/h6><\/div><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container has_bg_color\"><div class=\"vc_column-inner us_custom_c170caaa\"><div class=\"wpb_wrapper\"><div class=\"w-grid us_carousel type_carousel layout_476 no_results preload_style_spinner items_3\" id=\"us_grid_2\" style=\"--items:3;--gap:1rem;\"><style>.layout_476 .w-grid-item-h{}.layout_476 .usg_post_title_1{transition-duration:0.3s;transform-origin:50% 50%;transform:scale(1) translate(0%,0%)}.layout_476 .w-grid-item-h:focus-within .usg_post_title_1,.layout_476 .w-grid-item-h:hover .usg_post_title_1{transform:scale(1) translate(0%,0%);opacity:1;color:#1f87ff!important}.layout_476 .usg_post_title_1{font-weight:600!important;font-size:1rem!important}<\/style><div class=\"w-grid-list owl-carousel valign_stretch dotstyle_circle navstyle_circle arrows-ver-pos_middle arrows-hor-pos_on_sides_outside arrows-disabled_hide owl-responsive-2000\" style=\"--transition-duration:350ms;\"><\/div><div class=\"w-grid-carousel-json hidden\" onclick='return {&quot;carousel_settings&quot;:{&quot;aria_labels&quot;:{&quot;prev&quot;:&quot;Previous&quot;,&quot;next&quot;:&quot;Next&quot;},&quot;autoplayContinual&quot;:true,&quot;autoplayHoverPause&quot;:false,&quot;autoplayTimeout&quot;:3000,&quot;autoWidth&quot;:false,&quot;smartSpeed&quot;:350,&quot;margin&quot;:0,&quot;mouseDrag&quot;:true,&quot;rtl&quot;:false,&quot;slideBy&quot;:&quot;1&quot;,&quot;touchDrag&quot;:true,&quot;slideTransition&quot;:&quot;&quot;,&quot;responsive&quot;:{&quot;0&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:true,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:false,&quot;items&quot;:1,&quot;loop&quot;:false,&quot;nav&quot;:false,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;601&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:true,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:false,&quot;items&quot;:2,&quot;loop&quot;:false,&quot;nav&quot;:false,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;1025&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:true,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:false,&quot;items&quot;:3,&quot;loop&quot;:false,&quot;nav&quot;:false,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;1281&quot;:{&quot;items&quot;:3,&quot;autoplay&quot;:true,&quot;center&quot;:false,&quot;dots&quot;:false,&quot;nav&quot;:false,&quot;autoHeight&quot;:false,&quot;autoWidth&quot;:false,&quot;loop&quot;:false,&quot;stagePadding&quot;:0}}}}'><\/div><\/div><div class=\"w-grid-none type_message\">No results found.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row hide_on_tablets hide_on_mobiles height_medium color_primary with_img parallax_ver parallaxdir_reversed\" id=\"section-28\"><div class=\"l-section-img\" role=\"img\" aria-label=\"Image\" data-img-width=\"2500\" data-img-height=\"922\" style=\"background-image: url(https:\/\/ilja-schlak.de\/wp-content\/uploads\/2021\/12\/cloud-security-header.jpg);\"><\/div><div class=\"l-section-overlay\" style=\"background:rgba(15,19,31,0.65)\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container stretched\"><div class=\"vc_column-inner us_custom_b731b683\"><div class=\"wpb_wrapper\"><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-8 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_35b09ed1\"><div class=\"wpb_wrapper\"><div class=\"w-text us_custom_47cebc2a has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Our newsletter<\/span><\/span><\/div><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Subscribe and never miss any content<\/span><\/span><\/h2><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>[mc4wp_form id=&#8221;730&#8243;]<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row hide_on_default hide_on_laptops height_medium color_primary with_img parallax_ver parallaxdir_reversed\" id=\"mobil-newsletter\"><div class=\"l-section-img\" role=\"img\" aria-label=\"Image\" data-img-width=\"2500\" data-img-height=\"922\" style=\"background-image: url(https:\/\/ilja-schlak.de\/wp-content\/uploads\/2021\/12\/cloud-security-header.jpg);\"><\/div><div class=\"l-section-overlay\" style=\"background:rgba(15,19,31,0.65)\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"g-cols wpb_row us_custom_37d0561f via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-text us_custom_47cebc2a has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Our newsletter<\/span><\/span><\/div><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Subscribe and never miss any content<\/span><\/span><\/h2><div class=\"w-separator size_medium\"><\/div><\/div><\/div><\/div><\/div><div class=\"g-cols wpb_row us_custom_37d0561f via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_37d0561f\"><div class=\"wpb_wrapper\"><p>[mc4wp_form id=&#8221;730&#8243;]<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-grid us_carousel type_carousel layout_725 overflow_hidden preload_style_spinner items_3\" id=\"us_grid_3\" style=\"--items:3;--gap:1.5rem;\"><div class=\"w-grid-list owl-carousel valign_stretch dotstyle_circle navstyle_circle arrows-ver-pos_middle arrows-hor-pos_on_sides_outside arrows-disabled_hide owl-responsive-2000 with_dots with_arrows\" style=\"--transition-duration:350ms;--arrows-size:1.5rem;--arrows-hor-offset:calc(0px + 1.5rem);--arrows-gap:10px;\">\t<article class=\"w-grid-item post-2325 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2325\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/cyberattacks-on-germany-2025\/\" aria-label=\"Cyberattacks on Germany 2025 cause record damage of 202 billion euros\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-1024x684.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"Cyberattacks on Germany 2025 cause record damage of 202 billion euros.\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-1024x684.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-200x134.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-450x301.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-350x234.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025-748x500.webp 748w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cyberattacks-on-Germany-2025.webp 1928w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/cyberattacks-on-germany-2025\/\">Cyberattacks on Germany 2025 cause record damage of 202 billion euros<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-04-23T11:58:47+02:00\">23. April 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">Cyberattacks on Germany caused 202 billion euros in damage. The BSI Situation Report and Bitkom study 2025 identify ransomware and&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2299 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2299\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/cybersecurity-market-q1-2026-record-funding\/\" aria-label=\"Cybersecurity Market Q1 2026 \u2013 Record Momentum in Funding and M&#038;A\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"The cybersecurity market Q1 2026 hit $6.3B in total activity. AI security captured 46% of capital, four new unicorns emerged, and CrowdStrike led M&amp;A.\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/04\/Cybersecurity-Market-Q1-2026.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/cybersecurity-market-q1-2026-record-funding\/\">Cybersecurity Market Q1 2026 \u2013 Record Momentum in Funding and M&#038;A<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-04-05T20:23:03+02:00\">5. April 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The cybersecurity market Q1 2026 reached a combined $6.3 billion in strategic activity. AI security attracted 46% of all invested&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2289 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2289\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/litellm-supply-chain-attack-credential-stealer\/\" aria-label=\"LiteLLM Supply Chain Attack &#8211; PyPI Packages Compromised with Credential Stealer\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"LiteLLM supply chain attack\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/LiteLLM-supply-chain-attack.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/litellm-supply-chain-attack-credential-stealer\/\">LiteLLM Supply Chain Attack &#8211; PyPI Packages Compromised with Credential Stealer<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-25T16:23:41+01:00\">25. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">LiteLLM supply chain attack on March 24, 2026 compromised two PyPI versions of the popular Python library with a three-stage&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2275 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2275\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/trivy-supply-chain-attack-cause-timeline-cicd-impact\/\" aria-label=\"Trivy Supply Chain Attack Explained: Cause, Timeline, and CI\/CD Impact\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"Trivy Supply Chain Attack Explained: Cause, Timeline, and CI\/CD Impact\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Trivy-supply-chain-attack.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/trivy-supply-chain-attack-cause-timeline-cicd-impact\/\">Trivy Supply Chain Attack Explained: Cause, Timeline, and CI\/CD Impact<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-22T16:20:40+01:00\">22. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The Trivy supply chain attack hit developers and CI\/CD pipelines because attackers remained inside the software supply chain after an&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2265 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2265\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/it-security-market-2026-cybersecurity-strategic-importance\/\" aria-label=\"The IT Security Market in 2026 Shows Why Cybersecurity Matters More\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"The IT security market in 2026 highlights the growing strategic importance of cybersecurity. New figures from Australia and Germany show why security is becoming a higher business priority.\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/The-IT-security-market-in-2026.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/it-security-market-2026-cybersecurity-strategic-importance\/\">The IT Security Market in 2026 Shows Why Cybersecurity Matters More<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-20T10:07:28+01:00\">20. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The IT security market in 2026 confirms the strategic importance of cybersecurity The latest figures from Australia and the most&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2255 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2255\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/amazon-aws-ai-outages-senior-engineers-cybersecurity\/\" aria-label=\"Amazon AWS AI Outages Show Why Senior Engineers Still Matter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"Amazon AWS AI Outages show why Amazon is relying more on senior engineers for critical changes and why pure AI automation reaches its limits in production, security, and cybersecurity governance.\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Amazon-AWS-AI-Outages.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/amazon-aws-ai-outages-senior-engineers-cybersecurity\/\">Amazon AWS AI Outages Show Why Senior Engineers Still Matter<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-18T10:44:35+01:00\">18. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">Amazon AWS AI outages show why the company is once again relying more heavily on experienced engineers for critical changes:&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2243 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2243\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/enforcers-project-industrial-software-cybersecurity-europe\/\" aria-label=\"ENFORCERS Project Strengthens Cybersecurity for Industrial Software in Europe\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"ENFORCERS Project Strengthens Cybersecurity for Industrial Software in Europe\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/ENFORCERS-Project-Cybersecurity-for-Industrial-Software-in-Europe.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/enforcers-project-industrial-software-cybersecurity-europe\/\">ENFORCERS Project Strengthens Cybersecurity for Industrial Software in Europe<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-14T16:34:48+01:00\">14. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">ENFORCERS project brings together Europe\u2019s approach to stronger cybersecurity for industrial software, secure supply chains, and coordinated incident response across&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2233 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2233\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/veeam-backup-vulnerabilities-immediate-patching\/\" aria-label=\"Veeam Backup vulnerabilities in versions 12 and 13 require immediate patching\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"Veeam Backup vulnerabilities in versions 12 and 13 require immediate patching\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Veeam-Backup-vulnerabilities-in-versions-12-and-13-require-immediate-patching.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/veeam-backup-vulnerabilities-immediate-patching\/\">Veeam Backup vulnerabilities in versions 12 and 13 require immediate patching<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-13T10:15:04+01:00\">13. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">Veeam Backup vulnerabilities in versions 12 and 13 allow remote code execution in some cases, with a CVSS score of&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2226 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2226\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/detecting-5g-attacks-with-ai-twinguard-o-ran-5g-core\/\" aria-label=\"Detecting 5G attacks with AI \u2013 TwinGuard tested in O-RAN and 5G core environments\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"Detecting 5G attacks with AI\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/Detecting-5G-attacks-with-AI.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/detecting-5g-attacks-with-ai-twinguard-o-ran-5g-core\/\">Detecting 5G attacks with AI \u2013 TwinGuard tested in O-RAN and 5G core environments<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-12T00:18:25+01:00\">12. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">Detecting 5G attacks with AI is the focus of a new research project from the University of Surrey. According to&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item post-2218 post type-post status-publish format-standard has-post-thumbnail hentry category-news\" data-id=\"2218\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/one-in-two-companies-halt-ai-projects\/\" aria-label=\"One in Two Companies Halt AI Projects Due to Security and Governance Concerns\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects-1024x683.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"One in Two Companies Halt AI Projects\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects-1024x683.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects-300x200.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects-600x400.webp 600w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects-200x133.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects-450x300.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects-350x233.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects-750x500.webp 750w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/03\/One-in-Two-Companies-Halt-AI-Projects.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_center valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/one-in-two-companies-halt-ai-projects\/\">One in Two Companies Halt AI Projects Due to Security and Governance Concerns<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_2 has_text_color align_center valign_top wrap\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_simple color_link_inherit\"><a class=\"term-120 term-news\" href=\"https:\/\/ilja-schlak.de\/en\/category\/news\/\"><span class=\"w-btn-label\">News<\/span><\/a><\/div><div class=\"w-post-elm post_author usg_post_author_1 vcard author color_link_inherit\"><div class=\"post-author-meta\"><a href=\"https:\/\/ilja-schlak.de\/en\/author\/iljaschlak\/\" class=\"post-author-name fn\">Ilja Schlak<\/a><\/div><\/div><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-03-08T15:14:55+01:00\">8. March 2026<\/time><\/div><div class=\"w-post-elm post_content usg_post_content_1\">One in two companies halt AI projects: CoreView puts the global figure at 51 percent. Studies show why security, governance,&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div><div class=\"w-grid-carousel-json hidden\" onclick='return {&quot;carousel_settings&quot;:{&quot;aria_labels&quot;:{&quot;prev&quot;:&quot;Previous&quot;,&quot;next&quot;:&quot;Next&quot;},&quot;autoplayContinual&quot;:false,&quot;autoplayHoverPause&quot;:false,&quot;autoplayTimeout&quot;:3000,&quot;autoWidth&quot;:false,&quot;smartSpeed&quot;:350,&quot;margin&quot;:0,&quot;mouseDrag&quot;:true,&quot;rtl&quot;:false,&quot;slideBy&quot;:&quot;1&quot;,&quot;touchDrag&quot;:true,&quot;slideTransition&quot;:&quot;cubic-bezier(.78,.13,.15,.86)&quot;,&quot;responsive&quot;:{&quot;0&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:true,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:true,&quot;items&quot;:1,&quot;loop&quot;:true,&quot;nav&quot;:false,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;601&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:true,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:true,&quot;items&quot;:2,&quot;loop&quot;:true,&quot;nav&quot;:true,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;1025&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:true,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:true,&quot;items&quot;:3,&quot;loop&quot;:true,&quot;nav&quot;:true,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;1281&quot;:{&quot;items&quot;:3,&quot;autoplay&quot;:true,&quot;center&quot;:false,&quot;dots&quot;:true,&quot;nav&quot;:true,&quot;autoHeight&quot;:false,&quot;autoWidth&quot;:false,&quot;loop&quot;:true,&quot;stagePadding&quot;:0}}}}'><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_medium with_line width_default thick_1 style_solid color_border align_center with_text with_content\" id=\"blog_cards\"><div class=\"w-separator-h\"><h4 class=\"w-separator-text\"><a href=\"#blog_cards\" class=\"smooth-scroll\"><span>Web<\/span><\/a><\/h4><\/div><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-8 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-grid us_grid type_grid layout_1336 cols_1 preload_style_spinner\" id=\"us_grid_4\" style=\"--columns:1;--gap:1.5rem;\" data-filterable=\"true\"><style>@media (min-width:1024px){#us_grid_4 .w-post-elm.post_title{font-size:3rem!important}}.layout_1336 .w-grid-item-h{}@media(max-width:479px){.layout_1336 .usg_post_image_1{display:none!important}}.layout_1336 .usg_hwrapper_1{color:var(--color-content-text)!important;margin-right:10%!important;padding-top:6%!important;padding-bottom:6%!important;background:var(--color-content-bg-alt)!important}.layout_1336 .usg_vwrapper_1{width:48%!important;margin-left:6%!important;margin-right:0!important}.layout_1336 .usg_post_image_1{width:50%!important;margin-left:7%!important;margin-right:-11%!important}.layout_1336 .usg_post_title_1{font-weight:700!important;line-height:1.2!important}.layout_1336 .usg_post_content_1{font-size:0.9rem!important}@media (max-width:600px){.layout_1336 .usg_hwrapper_1{margin-left:0!important;margin-right:0!important;padding-top:0!important;padding-bottom:0!important}.layout_1336 .usg_vwrapper_1{width:86%!important;margin:7% 7% 5% 7%!important}.layout_1336 .usg_post_image_1{width:100%!important;margin-left:0!important;margin-right:0!important}}<\/style><div class=\"w-grid-list\">\t<article class=\"w-grid-item size_1x1 post-1933 post type-post status-publish format-standard has-post-thumbnail hentry category-web\" data-id=\"1933\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_none valign_center wrap\"><div class=\"w-vwrapper usg_vwrapper_1 align_none valign_top\"><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><a class=\"w-btn us-btn-style_badge term-115 term-web\" href=\"https:\/\/ilja-schlak.de\/en\/category\/web\/\"><span class=\"w-btn-label\">Web<\/span><\/a><\/div><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/ilja-schlak.de\/en\/wordpress-seo-2026\/\">WordPress SEO 2026<\/a><\/h2><div class=\"w-post-elm post_content usg_post_content_1\"><p>WordPress SEO 2026: Deep-dive guide for zero-click, GEO, E-E-A-T, information gain, digital consensus, and technical stability\u2014built for rankings and AI citations.<\/p>\n<\/div><\/div><div class=\"w-post-elm post_image usg_post_image_1 has_width stretched\"><a href=\"https:\/\/ilja-schlak.de\/en\/wordpress-seo-2026\/\" aria-label=\"WordPress SEO 2026\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"307\" src=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/01\/WordPress-SEO-2026-1-1024x307.webp\" class=\"attachment-large size-large wp-post-image\" alt=\"WordPress SEO 2026: Deep-dive guide for zero-click, GEO, E-E-A-T, information gain, digital consensus, and technical stability\u2014built for rankings and AI citations.\" srcset=\"https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/01\/WordPress-SEO-2026-1-1024x307.webp 1024w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/01\/WordPress-SEO-2026-1-300x90.webp 300w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/01\/WordPress-SEO-2026-1-200x60.webp 200w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/01\/WordPress-SEO-2026-1-450x135.webp 450w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/01\/WordPress-SEO-2026-1-350x105.webp 350w, https:\/\/ilja-schlak.de\/wp-content\/uploads\/2026\/01\/WordPress-SEO-2026-1-1000x300.webp 1000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div>\t<div class=\"w-grid-preloader\">\r\n\t\t<div class=\"g-preloader type_1\">\r\n\t\t\t<div><\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\t\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:1,&quot;pagination&quot;:&quot;none&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;1&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;1336&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;none&quot;,&quot;overriding_link&quot;:&quot;{\\&quot;url\\&quot;:\\&quot;\\&quot;}&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;category&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;web&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;],&quot;ignore_sticky_posts&quot;:1,&quot;posts_per_page&quot;:&quot;1&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_post_type&quot;:&quot;post&quot;,&quot;us_grid_ajax_index&quot;:4,&quot;us_grid_filter_query_string&quot;:null,&quot;us_grid_index&quot;:4,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-grid us_grid type_grid layout_1338 no_results cols_1 preload_style_spinner\" id=\"us_grid_5\" style=\"--columns:1;--gap:30px;\" data-filterable=\"true\"><style>.layout_1338 .w-grid-item-h{}.layout_1338 .usg_post_image_1{width:30%!important;margin-right:5%!important}.layout_1338 .usg_post_title_1{font-size:1.2rem!important;margin-bottom:0.3rem!important}.layout_1338 .usg_post_date_1{color:var(--color-content-faded)!important;font-size:0.8rem!important;line-height:1.6!important}<\/style><div class=\"w-grid-list\"><\/div>\t<div class=\"w-grid-preloader\">\r\n\t\t<div class=\"g-preloader type_1\">\r\n\t\t\t<div><\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\t\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:0,&quot;pagination&quot;:&quot;none&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;1&quot;,&quot;exclude_items&quot;:&quot;prev&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;1338&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;none&quot;,&quot;overriding_link&quot;:&quot;{\\&quot;url\\&quot;:\\&quot;\\&quot;}&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;category&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;web&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;],&quot;ignore_sticky_posts&quot;:1,&quot;post__not_in&quot;:[2325,2307,2299,2289,2275,2265,2325,2299,2289,2275,2265,2255,2243,2233,2226,2218,1933],&quot;posts_per_page&quot;:&quot;3&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_post_type&quot;:&quot;post&quot;,&quot;us_grid_ajax_index&quot;:5,&quot;us_grid_filter_query_string&quot;:null,&quot;us_grid_index&quot;:5,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><div class=\"w-grid-none type_message\">No results found.<\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\" id=\"section-03\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_3c634c4e\"><div class=\"wpb_wrapper\"><h2>Glossary<\/h2>\n<div class=\"w-iconbox-text\">\n<p>Most important terms related to cybersecurity, information security, GRC and pentesting.<\/p>\n<\/div>\n<\/div><\/div><div class=\"w-separator hide_on_tablets hide_on_mobiles size_medium\"><\/div><div class=\"w-btn-wrapper align_none hide_on_tablets hide_on_mobiles\"><a class=\"w-btn us-btn-style_2\" href=\"https:\/\/ilja-schlak.de\/category\/glossar\/\"><span class=\"w-btn-label\">To the glossary<\/span><\/a><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-8 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-grid us_grid type_grid layout_1372 no_results cols_4 pagination_ajax preload_style_spinner\" id=\"us_grid_6\" style=\"--columns:4;--gap:0.4rem;\" data-filterable=\"true\"><style>@media (max-width:1280px){#us_grid_6{--columns:3!important}}@media (max-width:1024px){#us_grid_6{--columns:2!important}}@media (max-width:600px){#us_grid_6{--columns:2!important}}@media (min-width:1024px){#us_grid_6 .w-post-elm.post_title{font-size:1.2rem!important}}.layout_1372 .w-grid-item-h{border-radius:0.3rem;box-shadow:0 0rem 0rem rgba(0,0,0,0.1),0 0rem 0rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch .layout_1372 .w-grid-item-h:hover{box-shadow:0 0.2rem 0.4rem rgba(0,0,0,0.1),0 0.67rem 2rem rgba(0,0,0,0.15);z-index:4}.layout_1372 .usg_vwrapper_1{transition-duration:0.3s;transform-origin:50% 50%;transform:scale(1) translate(0%,0%)}.layout_1372 .w-grid-item-h:focus-within .usg_vwrapper_1,.layout_1372 .w-grid-item-h:hover .usg_vwrapper_1{transform:scale(1) translate(0%,0%);opacity:1;border-color:transparent!important}.layout_1372 .usg_vwrapper_1{border-radius:0.3rem!important;padding:10%!important;border:1px solid var(--color-content-border)!important}.layout_1372 .usg_post_title_1{font-weight:700!important;font-size:1.1rem!important}.layout_1372 .usg_post_taxonomy_1{font-weight:700!important;text-transform:uppercase!important;font-size:14px!important}<\/style><div class=\"w-grid-list\"><\/div>\t<div class=\"w-grid-preloader\">\r\n\t\t<div class=\"g-preloader type_1\">\r\n\t\t\t<div><\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\t\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:0,&quot;pagination&quot;:&quot;ajax&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;4&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;1372&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;none&quot;,&quot;overriding_link&quot;:&quot;{\\&quot;url\\&quot;:\\&quot;\\&quot;}&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;glossary&quot;],&quot;post_status&quot;:[&quot;publish&quot;],&quot;posts_per_page&quot;:&quot;14&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_post_type&quot;:&quot;glossary&quot;,&quot;us_grid_ajax_index&quot;:6,&quot;us_grid_filter_query_string&quot;:null,&quot;us_grid_index&quot;:6,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><div class=\"w-grid-none type_message\">No results found.<\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"WordPress SEO 2026 A deep-dive guide for zero-click, E-E-A-T, information gain, digital consensus, and LLM visibility. Short definition: WordPress SEO 2026 describes the optimization of WordPress websites for classic rankings and AI-shaped search experiences (e.g., AI Overviews\/answer systems). It is a deep-dive guide for a successful WordPress SEO strategy for the year 2026. The focus...","protected":false},"author":1,"featured_media":1898,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1899","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/pages\/1899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/comments?post=1899"}],"version-history":[{"count":4,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/pages\/1899\/revisions"}],"predecessor-version":[{"id":1952,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/pages\/1899\/revisions\/1952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/media\/1898"}],"wp:attachment":[{"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/media?parent=1899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}