{"id":2969,"date":"2024-05-13T09:30:50","date_gmt":"2024-05-13T07:30:50","guid":{"rendered":"https:\/\/www.tec4net.com\/web\/?p=2969"},"modified":"2024-05-13T09:30:50","modified_gmt":"2024-05-13T07:30:50","slug":"0930-3","status":"publish","type":"post","link":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/","title":{"rendered":"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand"},"content":{"rendered":"<p>Das US-amerikanische National Institute of Standards and Technology (NIST) betreibt die National Vulnerability Database (NVD), die seit Februar dieses Jahres mit einem erheblichen R\u00fcckstau an Analysen zu k\u00e4mpfen hat. Das NIST bem\u00fcht sich nun um L\u00f6sungen f\u00fcr dieses Problem.<\/p>\n<p><a href=\"https:\/\/www.heise.de\/news\/Sicherheitslueckendatenbank-NVD-NIST-sucht-den-Ausweg-aus-Analyserueckstand-9673988.html\">https:\/\/www.heise.de\/news\/Sicherheitslueckendatenbank-NVD-NIST-sucht-den-Ausweg-aus-Analyserueckstand-9673988.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Das US-amerikanische National Institute of Standards and Technology (NIST) betreibt die National Vulnerability Database (NVD), die seit Februar dieses Jahres mit einem erheblichen R\u00fcckstau an Analysen zu k\u00e4mpfen hat. Das NIST bem\u00fcht sich nun um L\u00f6sungen f\u00fcr dieses Problem. https:\/\/www.heise.de\/news\/Sicherheitslueckendatenbank-NVD-NIST-sucht-den-Ausweg-aus-Analyserueckstand-9673988.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[157,307,110,77,305,304,306],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand - tec4net<\/title>\n<meta name=\"description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand - tec4net\" \/>\n<meta property=\"og:description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/\" \/>\n<meta property=\"og:site_name\" content=\"tec4net\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-13T07:30:50+00:00\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/\"},\"author\":{\"name\":\"Matthias Walter\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\"},\"headline\":\"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand\",\"datePublished\":\"2024-05-13T07:30:50+00:00\",\"dateModified\":\"2024-05-13T07:30:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/\"},\"wordCount\":60,\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"keywords\":[\"BSI\",\"Cybersecurity\",\"Datensicherheit\",\"ISO 27001\",\"L\u00f6sungen\",\"NIST\",\"Schwachstellen\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/\",\"name\":\"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand - tec4net\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\"},\"datePublished\":\"2024-05-13T07:30:50+00:00\",\"dateModified\":\"2024-05-13T07:30:50+00:00\",\"description\":\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tec4net.com\/web\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"name\":\"tec4net\",\"description\":\"Ihr starker IT-Partner\",\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tec4net.com\/web\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\",\"name\":\"tec4net\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"contentUrl\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"width\":178,\"height\":163,\"caption\":\"tec4net\"},\"image\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\",\"name\":\"Matthias Walter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"caption\":\"Matthias Walter\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand - tec4net","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/","og_locale":"de_DE","og_type":"article","og_title":"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand - tec4net","og_description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","og_url":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/","og_site_name":"tec4net","article_published_time":"2024-05-13T07:30:50+00:00","author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/#article","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/"},"author":{"name":"Matthias Walter","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b"},"headline":"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand","datePublished":"2024-05-13T07:30:50+00:00","dateModified":"2024-05-13T07:30:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/"},"wordCount":60,"publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"keywords":["BSI","Cybersecurity","Datensicherheit","ISO 27001","L\u00f6sungen","NIST","Schwachstellen"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/","url":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/","name":"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand - tec4net","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/#website"},"datePublished":"2024-05-13T07:30:50+00:00","dateModified":"2024-05-13T07:30:50+00:00","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","breadcrumb":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tec4net.com\/web\/2024\/05\/13\/0930-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tec4net.com\/web\/"},{"@type":"ListItem","position":2,"name":"NVD-Schwachstellendatenbank: NIST sucht L\u00f6sungen f\u00fcr Analyser\u00fcckstand"}]},{"@type":"WebSite","@id":"https:\/\/www.tec4net.com\/web\/#website","url":"https:\/\/www.tec4net.com\/web\/","name":"tec4net","description":"Ihr starker IT-Partner","publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tec4net.com\/web\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tec4net.com\/web\/#organization","name":"tec4net","url":"https:\/\/www.tec4net.com\/web\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/","url":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","contentUrl":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","width":178,"height":163,"caption":"tec4net"},"image":{"@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b","name":"Matthias Walter","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","caption":"Matthias Walter"}}]}},"_links":{"self":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/2969"}],"collection":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/comments?post=2969"}],"version-history":[{"count":1,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/2969\/revisions"}],"predecessor-version":[{"id":2971,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/2969\/revisions\/2971"}],"wp:attachment":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/media?parent=2969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/categories?post=2969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/tags?post=2969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}