<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://infosafety.de/sitemap-stylesheet.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://infosafety.de/sequirly-ki-datenlecks-stoppen/</loc>
    <lastmod>2026-04-20T11:00:09+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/ki-sicherheit-tool.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/Ki-Anti-Datenleck-Tool-infosicherheit-1024x572.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/ceo-fraud-kostet-zulieferer-87-000-euro-in-einer-einzigen-ueberweisung/</loc>
    <lastmod>2026-04-16T08:55:11+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/ceo-fraud-vorfall-und-massnahmen-empfehlung.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/ceo-fraud-ablauf-und-massnahmen-1024x576.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/nis2-pruefungen-live-cyber-alarm-fur-dach-kmu-ki-teams/</loc>
    <lastmod>2026-04-15T10:20:06+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/IT-Risiken-und-Loesungen-in-Unternehmen.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/nis2-geltungsbereich-pruefen.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/eset-protect-zentrale-endpoint-security-fuer-kmu/</loc>
    <lastmod>2026-04-13T10:04:06+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/endpoint-security-tool-vorstellung-eset-protect.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/endpoint-security-vergleich-unternehmen-1024x683.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/it-sicherheit-lieferkette-beispiel-fall-saas/</loc>
    <lastmod>2026-04-09T08:44:16+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/lieferketten-it-sicherheit-risiko-deutschland-beispiel.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/IT-Risiko-Lieferkette-Beispiel.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/so-schuetzen-kmu-und-ki-teams-sich-jetzt-vor-phishing-zero-days-und-lieferkettenrisiken/</loc>
    <lastmod>2026-04-08T09:18:23+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/mittelstand-cyber-risiken-2026.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/top-3-cyber-risiko-fuer-mittelstand-april-2026.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/crowdstrike-falcon-go-ki-endpoint-schutz-fuer-kleine-teams/</loc>
    <lastmod>2026-04-06T10:28:49+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/it-security-tools-kleine-unternehmen.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/falcon-go-infosec-vergleich-1024x572.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/shadow-it-private-clouds-kosten-maschinenbauer-kunden/</loc>
    <lastmod>2026-04-02T09:15:23+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/shadow-it-risiken-kosten-praxisfall-dsgvo.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/shadow-it-erklaert-infosafety.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/supply-chain-hacks-ki-agenten-was-kmu-jetzt-wirklich-wissen-muessen/</loc>
    <lastmod>2026-04-01T10:03:22+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/04/KI-Sicherheitsrisiken-Vorfaelle.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/greenbone-openvas-open-source-schwachstellenscanner-fuer-kmu/</loc>
    <lastmod>2026-03-30T11:18:19+02:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/Infosicherheit-Tool-der-Woche-Greenbone.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/risiko-schwachstellen-scan-it-vorher-nachher-1024x683.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/ransomware-angriff-im-mittelstand-fertigung-fuenf-tage-lahm/</loc>
    <lastmod>2026-03-26T09:58:39+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/ransomware-angriff-mittelstand-beispiel.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/nis2-frist-matten-ransomware-ki-luecken-kw12-2026/</loc>
    <lastmod>2026-03-25T10:38:31+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/Junges-IT-Team-in-einem-deutschen-KMU-Buero-reagiert-morgens-auf-einen-Ransomware-Angriff.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/nessus-professional-tool-vorgestellt-schwachstellen-scannen/</loc>
    <lastmod>2026-03-23T10:41:50+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/Nessus-Professional-Schwachstellen-Scans-IT.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/Nessus-Scan-Workflow-fuer-KMU-Vorschlag-1024x572.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/kompromittiertes-m365-konto-mfa-bypass-250-000-kosten/</loc>
    <lastmod>2026-03-19T08:43:53+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/MFA-Bypass-IT-Sicherheit-Deutschland.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/sap-schwachstellen-ransomware-paass-logistik/</loc>
    <lastmod>2026-03-18T09:31:37+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/IT-Security-Vorfaelle-Maerz-KW11-2026.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/tool-bitdefender-gravityzone-endpoint-schutz/</loc>
    <lastmod>2026-03-16T11:35:58+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/it-sicherheit-tool-bitdefender-vorstellung-e1773657430642.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/praxisfall-ransomware-stoppt-kmu-produktion/</loc>
    <lastmod>2026-03-13T10:35:09+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/ransomware-in-kmu-praxisbeispiel-learnings.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/infosafety-briefing-kw-11-2026-top-it-sicherheitsthemen/</loc>
    <lastmod>2026-03-11T09:00:12+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/NIS2-Probleme-IT-Sicherheit-Risiken.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/tool-der-woche-wazuh-open-source-siem-fuer-kmu/</loc>
    <lastmod>2026-03-10T08:58:48+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/IT-Security-Tool-der-Woche-1-SIEM-ISMS.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://infosafety.de/infosafety-briefing-kw-9-2026-it-sicherheitsueberblick/</loc>
    <lastmod>2026-03-11T09:00:24+01:00</lastmod>
    <image:image>
      <image:loc>https://infosafety.de/wp-content/uploads/2026/03/Infosafety-Briefing-KW-9-2026.png</image:loc>
    </image:image>
  </url>
</urlset>
