{"id":2528,"date":"2024-07-12T18:39:23","date_gmt":"2024-07-12T18:39:23","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2528"},"modified":"2024-07-12T18:43:13","modified_gmt":"2024-07-12T18:43:13","slug":"cisa-warnung-zur-red-team-aktivitat-betont-bedarf-an-tiefenverteidigung","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/de\/cybersicherheit\/cisa-warnung-zur-red-team-aktivitat-betont-bedarf-an-tiefenverteidigung\/","title":{"rendered":"CISA-Warnung zu Red-Team-Aktivit\u00e4ten betont die Notwendigkeit von Defense-in-Depth"},"content":{"rendered":"<p>Die Agentur f\u00fcr Cybersicherheit und Infrastruktursicherheit ver\u00f6ffentlichte eine sehr detaillierte Empfehlung mit dem Titel \"CISA Red Team's Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth\". Das Gutachten basiert auf einer detaillierten Bewertung, die im Jahr 2023 durchgef\u00fchrt wurde, einschlie\u00dflich der von dem roten Team eingesetzten TTPs. Die Ergebnisse und Empfehlungen helfen F\u00fchrungskr\u00e4ften, Leitern und Netzwerkverteidigern, die Cybersicherheit zu verbessern.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"key-findings-and-lessons-learned\"><strong>Wichtigste Erkenntnisse und Lehren aus den Erfahrungen<\/strong><\/h2>\n\n\n<p>Dem Bericht zufolge gibt es wichtige Erkenntnisse und Lehren aus der Bewertung, die bei der Umsetzung von robusten Defense-in-Depth-Strategien zu beachten sind. Zu den wichtigsten vom roten Team angewandten Taktiken und Techniken geh\u00f6ren:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Simulierte Vektoren f\u00fcr fortgeschrittene anhaltende Bedrohungen, um die Widerstandsf\u00e4higkeit des Netzes zu testen,<\/li>\n\n\n\n<li>Ausnutzung einer schwachen Netzsegmentierung und<\/li>\n\n\n\n<li>Ausgekl\u00fcgeltes Spear-Phishing f\u00fcr den Erstzugang.<\/li>\n<\/ul>\n\n\n\n<p>Diese Ergebnisse unterstreichen die F\u00e4higkeit von Organisationen, mehrschichtige Sicherheitsma\u00dfnahmen zu ergreifen, um solchen Bedrohungen wirksam begegnen zu k\u00f6nnen.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recommendations-to-improve-cybersecurity\"><strong>Empfehlungen zur Verbesserung der Cybersicherheit<\/strong><\/h2>\n\n\n<p>Die CISA gibt in ihrer Beratung verschiedene Empfehlungen zur Verbesserung der Cybersicherheit sowie der Erkennungs-, Reaktions- und Jagdf\u00e4higkeiten:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Einf\u00fchrung einer Tiefenverteidigung: <\/b>Ein Konzept, bei dem mehrere Ebenen von Sicherheitskontrollen in einer IT-Umgebung zum Schutz vor potenziellen Cyber-Bedrohungen und -Angriffen implementiert werden sollten.<\/li>\n\n\n\n<li><strong>Verwenden Sie eine robuste Netzsegmentierung:<\/strong> Unter Netzsegmentierung versteht man die Aufteilung des Netzes in verschiedene Segmente, um die Ausbreitung eines Angriffs zu erschweren und ihn somit im Falle eines Einbruchs leicht einzud\u00e4mmen.<\/li>\n\n\n\n<li><strong>Festlegung von Grundlinien:<\/strong> Implementierung von Baselines f\u00fcr den Netzwerkverkehr, die Anwendungsausf\u00fchrung und die Kontoauthentifizierung zur Ermittlung von Anomalien, die auf Eindringlinge hindeuten.<\/li>\n<\/ul>\n\n\n\n<p>Diese helfen Unternehmen, fortgeschrittene Cyberangriffe abzuwehren und ihre allgemeine Sicherheitslage zu verbessern.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"importance-of-the-cisas-crosssector-cybersecurity-performance-goals\"><strong>Bedeutung der sektor\u00fcbergreifenden Cybersicherheits-Leistungsziele des CISA<\/strong><\/h2>\n\n\n<p>Dem Dokument zufolge finden sich in den sektor\u00fcbergreifenden CISA-Leistungszielen f\u00fcr Cybersicherheit Ressourcen zur Identifizierung g\u00e4ngiger und folgenschwerer Bedrohungen, Taktiken, Techniken und Verfahren. Mit diesen Zielen soll Folgendes erreicht werden:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bereitstellung eines Basissatzes von Cybersicherheitspraktiken, die auf alle kritischen Infrastrukturen anwendbar sind;<\/li>\n\n\n\n<li>Bereitstellung von Benchmarks f\u00fcr die Messung und Verbesserung der Cybersicherheitsreife;<\/li>\n\n\n\n<li>Kombinieren Sie empfohlene Praktiken f\u00fcr die Eigent\u00fcmer von Informationstechnologie und Betriebstechnologie;<\/li>\n\n\n\n<li>A<em>nationale Sicherheitsrisiken \u00fcber die Risiken einzelner Unternehmen hinaus zu adressieren<\/em><\/li>\n<\/ul>\n\n\n\n<p>Die CPGs wurden nach eingehender Beratung durch Branchenexperten und Regierungsbeamte ausgew\u00e4hlt, um kleinen und mittleren Unternehmen dabei zu helfen, in Cybersicherheitsma\u00dfnahmen zu investieren, die zu hochwirksamen Sicherheitsergebnissen f\u00fchren.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"nists-cybersecurity-framework-alignment\"><strong>NIST's Cybersecurity Framework-Anpassung<\/strong><\/h2>\n\n\n<p>Die CPGs der CISA sind auf die Funktionen des NIST CSF abgestimmt. Zu diesen Funktionen geh\u00f6ren:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Regieren:<\/strong> Festlegung, Kommunikation und \u00dcberwachung von Erwartungen und der Risikomanagementstrategie der Organisation.<\/li>\n\n\n\n<li><strong>Identifizieren:<\/strong> Verst\u00e4ndnis der aktuellen Cybersicherheitsrisiken f\u00fcr die Organisation.<\/li>\n\n\n\n<li><strong>Besch\u00fctzen:<\/strong> Implementierung von Schutzma\u00dfnahmen zur Bew\u00e4ltigung der Cybersicherheitsrisiken f\u00fcr die Organisation.<\/li>\n\n\n\n<li><strong>Erkennen:<\/strong> Aufsp\u00fcren und Analysieren m\u00f6glicher Cyberangriffe und Kompromittierungen.<\/li>\n\n\n\n<li><strong>Antworten Sie:<\/strong> Reaktion auf aufgedeckte Cybersicherheitsvorf\u00e4lle.<\/li>\n\n\n\n<li><strong>Erholen:<\/strong> Wiederherstellung von Systemen, Anlagen und Abl\u00e4ufen, die von einem Cybersecurity-Vorfall betroffen sind.<\/li>\n<\/ul>\n\n\n\n<p>Die CISA arbeitet an der \u00dcberarbeitung ihrer CPGs, um sie mit der Version 2.0 des NIST CSF in Einklang zu bringen, damit sie angesichts der dynamischen, sich st\u00e4ndig weiterentwickelnden Cybersicherheitsszene relevant und hilfreich bleiben.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>I Afslutning<\/strong><\/h2>\n\n\n<p>Die neueste Empfehlung der CISA soll als Erinnerung daran dienen, Strategien f\u00fcr eine tiefgreifende Verteidigung zu entwickeln und gute Cybersicherheitspraktiken anzuwenden. Die Empfehlungen und Leitlinien helfen dabei, die eigene Cybersicherheitsposition gegen\u00fcber neuen Bedrohungen zu st\u00e4rken.<\/p>\n\n\n\n<p>Weitere Informationen finden Sie auf der Website der KAG: <strong><a href=\"https:\/\/www.cisa.gov\/securebydesign\" target=\"_blank\" rel=\"noreferrer noopener\">Sicher durch Design<\/a><\/strong> f\u00fcr die vollst\u00e4ndige Beratung und andere Ressourcen.<\/p>","protected":false},"excerpt":{"rendered":"<p>Die Agentur f\u00fcr Cybersicherheit und Infrastruktursicherheit hat eine sehr detaillierte Empfehlung mit dem Titel \"CISA Red Team's Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth\" ver\u00f6ffentlicht. The advisory... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/de\/cybersicherheit\/cisa-warnung-zur-red-team-aktivitat-betont-bedarf-an-tiefenverteidigung\/\"><span class=\"screen-reader-text\">CISA-Warnung zu Red-Team-Aktivit\u00e4ten betont die Notwendigkeit von Defense-in-Depth<\/span> read more<\/a><\/p>","protected":false},"author":3,"featured_media":2531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,27],"tags":[],"class_list":["post-2528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/de\/cybersicherheit\/cisa-warnung-zur-red-team-aktivitat-betont-bedarf-an-tiefenverteidigung\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth weiterlesen\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/de\/cybersicherheit\/cisa-warnung-zur-red-team-aktivitat-betont-bedarf-an-tiefenverteidigung\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:39:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschrieben von\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"articleSection\":[\"cybersecurity\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"width\":1265,\"height\":422,\"caption\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/de\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA-Warnung \u00fcber Red-Team-Aktivit\u00e4ten betont die Notwendigkeit von Defense-in-Depth | Sicherheitsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/de\/cybersicherheit\/cisa-warnung-zur-red-team-aktivitat-betont-bedarf-an-tiefenverteidigung\/","og_locale":"de_DE","og_type":"article","og_title":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth weiterlesen","og_url":"https:\/\/securitybriefing.net\/de\/cybersicherheit\/cisa-warnung-zur-red-team-aktivitat-betont-bedarf-an-tiefenverteidigung\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:39:23+00:00","article_modified_time":"2024-07-12T18:43:13+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Geschrieben von":"C\u00e9sar Daniel Barreto","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"wordCount":535,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","articleSection":["cybersecurity","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","name":"CISA-Warnung \u00fcber Red-Team-Aktivit\u00e4ten betont die Notwendigkeit von Defense-in-Depth | Sicherheitsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","width":1265,"height":422,"caption":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sicherheitsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sicherheitsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto ist ein gesch\u00e4tzter Cybersecurity-Autor und -Experte, der f\u00fcr sein fundiertes Wissen und seine F\u00e4higkeit bekannt ist, komplexe Cybersicherheitsthemen zu vereinfachen. Mit seiner umfassenden Erfahrung in den Bereichen Netzwerksicherheit und Datenschutz verfasst er regelm\u00e4\u00dfig aufschlussreiche Artikel und Analysen zu den neuesten Trends in der Cybersicherheit und informiert damit sowohl Fachleute als auch die \u00d6ffentlichkeit.","url":"https:\/\/securitybriefing.net\/de\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts\/2528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/comments?post=2528"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts\/2528\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/media\/2531"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/media?parent=2528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/categories?post=2528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/tags?post=2528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}