{"id":1493,"date":"2023-07-14T11:11:14","date_gmt":"2023-07-14T11:11:14","guid":{"rendered":"https:\/\/gb25.eco.de\/security\/"},"modified":"2026-05-07T09:54:33","modified_gmt":"2026-05-07T09:54:33","slug":"security","status":"publish","type":"page","link":"https:\/\/gb25.eco.de\/en\/topics\/security\/","title":{"rendered":"Security"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"27\" src=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1-1024x27.jpg\" alt=\"\" class=\"wp-image-4655\" style=\"object-fit:cover;width:1144px;height:30px\" srcset=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1-1024x27.jpg 1024w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1-300x8.jpg 300w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1-768x20.jpg 768w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1-50x1.jpg 50w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1-1144x30.jpg 1144w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1.jpg 1150w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Security<\/h1>\n\n\n\n<p>Security is a key priority for eco. As a cross-cutting issue, it permeates all areas of application and levels of the Internet. In addition to a wide range of initiatives and services, a dedicated Competence Group addresses current security issues from the industry\u2019s perspective. Complementing this, the Anti-Abuse Competence Group promotes internal exchange among members on current abuse-related topics, thereby strengthening collective expertise.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">IT Security Survey<\/h2>\n\n\n\n<p>Once a year, eco surveys IT security experts as part of the <strong>\u201cIT Security\u201d survey<\/strong> to gather their assessments of the current threat landscape, their evaluation of key security issues, and their views on relevant developments and trends. The topics covered range from the general and individual threat landscape, through organisational and technical measures, to forward-looking industry trends.<\/p>\n\n\n\n<p>On 27 October, eco published the results of the <a href=\"https:\/\/international.eco.de\/presse\/eco-it-security-survey-2025-how-ai-is-becoming-the-new-shield\/\">eco IT Security Survey 2025: How AI is Becoming the New Shield<\/a>. The threat situation continues to be assessed as very high. At the same time, companies are acting increasingly strategically and with foresight. AI is establishing itself as a central element of modern security architectures: it enables early identification of attacks, faster detection of complex patterns in large volumes of data, and sustainable strengthening of cyber resilience. In this way, AI is increasingly becoming a protective measure in a dynamic and highly complex threat landscape.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Future of Cybersecurity<\/h3>\n\n\n\n<p>The rapid development of digital technologies and the increasing interconnectedness of all areas of life present companies with a multitude of complex challenges. In the face of threats such as cyberattacks, data misuse and the manipulation of information systems, it\u2019s becoming increasingly important to develop new strategies and solutions for protection.<\/p>\n\n\n\n<p>In a world where artificial intelligence, the Internet of Things and quantum computing are gaining in importance, new opportunities are opening up, but so are new risks. At the meeting of the Security Competence Group on 11 March, experts discussed <strong>key future topics in cybersecurity<\/strong> and analysed how innovative approaches can be used to make the digital world safer.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.001.jpeg\" alt=\"\" class=\"wp-image-5285\" style=\"width:300px\" srcset=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.001.jpeg 1000w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.001-300x300.jpeg 300w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.001-150x150.jpeg 150w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.001-768x768.jpeg 768w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.001-50x50.jpeg 50w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">OT Security<\/h2>\n\n\n\n<p>At the event \u201c<strong>Security meets Operational Technology<\/strong>\u201d on 13 May, experts discussed the increasing convergence of IT and OT and the resulting security risks for companies. Modern production facilities, sensors and control systems are now highly connected and therefore more vulnerable to cyberattacks, which is why OT security must be given greater priority. During the event, it was emphasised that companies should implement measures on three levels: cultural, technical and organisational. <\/p>\n\n\n\n<p>At the cultural level, the aim is to view OT more strongly as part of the IT security strategy and to systematically record all OT devices in use. Technically, companies should, among other things, segment networks, reduce unnecessary access points and implement basic security measures such as VPNs or monitoring. Organisationally, it was emphasised that IT and OT teams must work more closely together and define clear responsibilities to ensure a holistic security strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Disinformation Security<\/h2>\n\n\n\n<p>In times of increasing connectivity and global crises, <strong>disinformation<\/strong> \u2013 for example in the form of deepfakes, artificially generated profiles and targeted online campaigns \u2013 is becoming increasingly relevant in political and societal terms. It influences public discourse, undermines trust in the media and poses a serious challenge to democratic processes.<\/p>\n\n\n\n<p>During the meeting of the Security Competence Group on 24 June, this topic was therefore examined from a cybersecurity perspective. The focus was on the question of what impact targeted disinformation has on our society, political stability and trust in digital media \u2013 and to what extent IT security technologies can help counteract such developments.<\/p>\n\n\n\n<p>In addition to providing in-depth technical insights, the event offered members of eco and EuroCloud the opportunity to discuss technical, legal and ethical aspects through joint dialogue.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.002.jpeg\" alt=\"\" class=\"wp-image-5287\" style=\"width:300px\" srcset=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.002.jpeg 1000w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.002-300x300.jpeg 300w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.002-150x150.jpeg 150w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.002-768x768.jpeg 768w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.002-50x50.jpeg 50w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">Quantum Cryptography<\/h2>\n\n\n\n<p>As part of Global Encryption Day 2025 on 21 October, the Security Competence Group hosted the webinar \u201c<strong>Quantum cryptography \u2013 the future of secure communication<\/strong>\u201d, during which experts discussed the impact of quantum computers on today\u2019s encryption systems. The focus was on the growing power of quantum computers, which could in future break common asymmetric encryption methods such as the RSA cryptosystem \u2013 a scenario often referred to as Q-Day. Against this backdrop, speakers emphasised that companies and public institutions should develop strategies for quantum-secure communication at an early stage, as the migration to new methods could take several years. Two technological approaches were discussed in particular: post-quantum cryptography, which is based on new mathematical methods, and quantum key distribution, which utilises the physical properties of quantum mechanics for secure key transmission.<\/p>\n\n\n\n<p>In addition, challenges relating to standardisation, certification and integration into existing IT infrastructures were addressed. The webinar made it clear that quantum-secure communication already plays a strategic role in IT security and digital sovereignty today.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.003.jpeg\" alt=\"\" class=\"wp-image-5289\" style=\"width:300px\" srcset=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.003.jpeg 1000w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.003-300x300.jpeg 300w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.003-150x150.jpeg 150w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.003-768x768.jpeg 768w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.003-50x50.jpeg 50w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">Digital Identities<\/h2>\n\n\n\n<p>The meeting of the Security Competence Group on 18 November focused entirely on <strong>modern identity infrastructures.<\/strong> The discussion focused on the central role that digital identities play in ensuring secure access to systems, data and digital services within interconnected IT landscapes. Alongside technological fundamentals, practical use cases were also presented \u2013 for example, in connection with identity management, role-based access systems and new approaches such as the EUDI Wallet.<\/p>\n\n\n\n<p>Another key focus was on how companies can meet both security requirements and regulatory mandates through interoperable and cryptographically secured identity solutions. The speakers also highlighted the importance of topics such as crypto-agility, certificate management and automated identity processes for resilient IT infrastructures. The event thus offered participants both technical insights and a forum for discussing the challenges and prospects of secure digital identities in business and public administration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cyber resilience<\/strong><\/h2>\n\n\n\n<p>At the webinar \u201c<strong>Security Operations Centre 2.0 \u2013 Resilience as a Strategic Success Factor in Cybersecurity<\/strong>\u201d on 25 November, experts discussed the future role of modern Security Operations Centres (SOCs) in an increasingly complex threat landscape. The focus was on how companies can further develop their security structures in the face of rising cyber risks and new regulatory requirements \u2013 particularly those arising from the NIS2 Directive.<\/p>\n\n\n\n<p>A key conclusion of the event was that a next-generation SOC must no longer be focused solely on responding to security incidents, but must actively contribute to strengthening cyber resilience. This includes, among other things, greater strategic integration of security processes, continuous risk analysis and better integration of technical and organisational measures.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.004.jpeg\" alt=\"\" class=\"wp-image-5291\" style=\"width:300px\" srcset=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.004.jpeg 1000w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.004-300x300.jpeg 300w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.004-150x150.jpeg 150w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.004-768x768.jpeg 768w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.004-50x50.jpeg 50w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">ISD 2025<\/h2>\n\n\n\n<p>The Internet Security Days (ISD) 2025 once again brought together experts from business, academia, politics and public administration at Cologne\u2019s RheinEnergieSTADION on 15 and 16 September to discuss current cyber threats, new technologies and the political framework. A key topic was email security as part of the \u201cYear of Email Security\u201d proclaimed by the Federal Office for Information Security (BSI), supplemented by workshops, presentations and discussions on the practical implementation of relevant security standards.<\/p>\n\n\n\n<p>Other key areas of focus included the security of digital infrastructures as the foundation for digital transformation and cyber resilience \u2013 that is, strategies for defending against ransomware, phishing and other threats. Alongside the technical programme, events such as Security Night powered by F5 and a stadium tour offered additional networking opportunities. Overall, the event highlighted the complexity of IT security and the need for collaboration, innovation and broad exchange.<\/p>\n\n\n\n<p>Further information <a href=\"https:\/\/international.eco.de\/news\/internet-security-days-2024-it-security-for-email-ai-and-nis2\/\">here<\/a>.<br><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.005.jpeg\" alt=\"\" class=\"wp-image-5293\" style=\"width:300px\" srcset=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.005.jpeg 1000w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.005-300x300.jpeg 300w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.005-150x150.jpeg 150w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.005-768x768.jpeg 768w, https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/7_8_KG-Sicherheit.005-50x50.jpeg 50w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Publications, short studies and news<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/international.eco.de\/presse\/cybersecurity-trends-2025\/\">Cybersecurity Trends 2025 <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/launch-of-the-electronic-patient-record-65-of-germans-feel-poorly-informed\/\">Launch of the Electronic Patient Record: 65% of Germans Feel Poorly Informed <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/change-your-password-day-5-tips-from-eco\/\">\u201cChange Your Password Day\u201d: 5 Tips from eco <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/nis2-and-the-enisa-implementing-guide-how-digital-companies-can-effectively-enhance-their-cybersecurity\/\">NIS2 and the ENISA \u201cImplementing Guide\u201d: How Digital Companies Can Effectively Enhance Their Cybersecurity <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/eco-association-europe-urgently-needs-a-successor-for-stopped-cve-database\/\">eco Association: Europe Urgently Needs a Successor for Stopped CVE Database <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/7-current-challenges-in-ot-security\/\">7 Current Challenges in OT Security <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/eco-expert-exchange-future-topics-in-cybersecurity\/\">eco Expert Exchange: Future Topics in Cybersecurity <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/buying-mothers-day-gifts-online-beware\/\">Buying Mother\u2019s Day Gifts Online: Beware of Nasty Surprises! <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/itot-convergence-eco-experts-recommend-action-on-three-levels\/\">IT\u2013OT Convergence: eco Experts Recommend Action on Three Levels <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/bka-situation-report-confirms-urgent-need-for-action-eco-calls-for-consistent-cyber-resilience-strategies\/\">BKA Situation Report Confirms Urgent Need for Action: eco Calls for Consistent Cyber Resilience Strategies <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/smartphones-a-holiday-hazard-eco-survey-reveals-that-one-in-three-people-do-not-protect-their-data\/\">Smartphones: A Holiday Hazard? eco Survey Reveals That One in Three People Do Not Protect Their Data <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/focus-on-email-security-apply-now-for-the-bsi-hall-of-fame\/\">Focus on Email Security: Apply Now for the BSI Hall of Fame <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/focus-on-cyber-resilience-threat-awareness-at-a-record-high\/\">Focus on Cyber Resilience: Threat Awareness at a Record High <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/digital-resilience-requires-clarity-practical-cybersecurity-rules-for-companies-needed\/\">Digital Resilience Requires Clarity: Practical Cybersecurity Rules for Companies Needed <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/nis-2-cabinet-decision-is-here-questions-remain\/\">NIS 2 Cabinet Decision Is Here: Questions Remain <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/confidential-ai-a-new-safe-space-for-ai-models\/\">Confidential AI: A New Safe Space for AI Models <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/100-years-of-quantum-research-cryptoagility-as-a-key-strategy-for-resilient-systems\/\">100 Years of Quantum Research: Cryptoagility as a Key Strategy for Resilient Systems<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/hall-of-fame-visible-recognition-for-pioneers-in-secure-email-traffic\/\">Hall of Fame: Visible Recognition for Pioneers in Secure Email Traffic <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/eco-on-the-german-cabinet-approval-of-kritis-act\/\">eco on the German Cabinet Approval of KRITIS Act: Act Swiftly, Avoid Duplication <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/eco-launches-comprehensively-renewed-security-survey\/\">eco Launches Comprehensively Renewed Security Survey <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/kooperation-eco-cyberintelligence-institute\/\">eco and cyberintelligence.institute: Joining Forces for Greater Cyber Resilience<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/cybersicherheit-im-fokus-rueckblick-auf-die-internet-security-days-2025\/\">Cybersecurity in Focus: Looking Back at the Internet Security Days 2025<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/quantum-cryptography-the-future-of-secure-communication\/\">Quantum Cryptography: The Future of Secure Communication <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/eco-it-security-survey-2025-how-ai-is-becoming-the-new-shield\/\">eco IT Security Survey 2025: How AI Is Becoming the New Shield<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/eco-association-of-the-internet-industry-on-nis-2-late-start-now-critical-germany-must-create-trust-and-clarity\/\">eco on NIS-2: Late Start, Now Critical \u2013 Germany Must Create Trust and Clarity<\/a> <\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/presse\/eco-survey-citizens-dissatisfied-with-digital-administration-digital-wallet-could-be-a-turning-point\/\">eco Survey: Citizens Dissatisfied with Digital Administration \u2013 Digital Wallet Could Be a Turning Point <\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Interviews with our members\u2028<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/international.eco.de\/news\/red-teaming-hacking-ethically\/\">Red Teaming: Hacking \u2013 Ethically! <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/zero-trust-in-smes-from-buzzword-to-strategy\/\">Zero Trust in SMEs: From Buzzword to Strategy<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/detect-ot-cyberthreats-in-miniature-replicas\/\">Detect OT CyberThreats in Miniature Replicas <\/a> <\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/trust-is-built-on-dependability\/\">Trust Is Built on Dependability <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/5-questions-for-constantin-schroeder-i-doit\/\">5 Questions for Constantin Schr\u00f6der, i-doit <\/a> <\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/5-questions-for-tim-cappelmann-airitsystems\/\">5 Questions for Tim Cappelmann, AirITSystems <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/ddos-protection-reimagined-ai-and-automation-as-the-answer-to-modern-attacks\/\">DDoS Protection Reimagined: AI and Automation as the Answer to Modern Attacks<\/a> <\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/it-security-in-smes-management-often-underestimates-the-importance-of-cyber-resilience\/\">IT Security in SMEs: \u201cManagement Often Underestimates the Importance of Cyber Resilience\u201d <\/a> <\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/dr-julian-weber-do-we-need-a-digital-airbag\/\">Dr Julian Weber, Do We Need a \u201cDigital Airbag\u201d? <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/mixed-forest-instead-of-monoculture-resilience-as-the-key-to-the-digital-future\/\">Mixed Forest Instead of Monoculture: Resilience as the Key to the Digital Future <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/international.eco.de\/news\/deep-fakes-a-challenge-for-business-and-society\/\">Deep Fakes: A Challenge for Business and Society <\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security Security is a key priority for eco. As a cross-cutting issue, it permeates all areas of application and levels of the Internet. In addition to a wide range of initiatives and services, a dedicated Competence Group addresses current security issues from the industry\u2019s perspective. Complementing this, the Anti-Abuse Competence&#8230;<a class=\"eco-loop-button\" href=\"https:\/\/gb25.eco.de\/en\/topics\/security\/\">Read More<\/a><\/p>\n","protected":false},"author":20,"featured_media":0,"parent":1557,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1493","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security - eco Gesch\u00e4ftsbericht 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gb25.eco.de\/en\/topics\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security - eco Gesch\u00e4ftsbericht 2025\" \/>\n<meta property=\"og:description\" content=\"Security Security is a key priority for eco. As a cross-cutting issue, it permeates all areas of application and levels of the Internet. In addition to a wide range of initiatives and services, a dedicated Competence Group addresses current security issues from the industry\u2019s perspective. Complementing this, the Anti-Abuse Competence...Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gb25.eco.de\/en\/topics\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"eco Gesch\u00e4ftsbericht 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T09:54:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1-1024x27.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gb25.eco.de\/en\/topics\/security\/\",\"url\":\"https:\/\/gb25.eco.de\/en\/topics\/security\/\",\"name\":\"Security - eco Gesch\u00e4ftsbericht 2025\",\"isPartOf\":{\"@id\":\"https:\/\/gb25.eco.de\/#website\"},\"datePublished\":\"2023-07-14T11:11:14+00:00\",\"dateModified\":\"2026-05-07T09:54:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gb25.eco.de\/en\/topics\/security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gb25.eco.de\/en\/topics\/security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gb25.eco.de\/en\/topics\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gb25.eco.de\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Topics\",\"item\":\"https:\/\/gb25.eco.de\/en\/topics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gb25.eco.de\/#website\",\"url\":\"https:\/\/gb25.eco.de\/\",\"name\":\"eco Gesch\u00e4ftsbericht 2025\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gb25.eco.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gb25.eco.de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gb25.eco.de\/#organization\",\"name\":\"eco Gesch\u00e4ftsbericht 2025\",\"url\":\"https:\/\/gb25.eco.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gb25.eco.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/Logo_GB25.svg\",\"contentUrl\":\"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/Logo_GB25.svg\",\"width\":100,\"height\":100,\"caption\":\"eco Gesch\u00e4ftsbericht 2025\"},\"image\":{\"@id\":\"https:\/\/gb25.eco.de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security - eco Gesch\u00e4ftsbericht 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gb25.eco.de\/en\/topics\/security\/","og_locale":"en_US","og_type":"article","og_title":"Security - eco Gesch\u00e4ftsbericht 2025","og_description":"Security Security is a key priority for eco. As a cross-cutting issue, it permeates all areas of application and levels of the Internet. In addition to a wide range of initiatives and services, a dedicated Competence Group addresses current security issues from the industry\u2019s perspective. Complementing this, the Anti-Abuse Competence...Read More","og_url":"https:\/\/gb25.eco.de\/en\/topics\/security\/","og_site_name":"eco Gesch\u00e4ftsbericht 2025","article_modified_time":"2026-05-07T09:54:33+00:00","og_image":[{"url":"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/03\/gb25_banner_1-1-1024x27.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gb25.eco.de\/en\/topics\/security\/","url":"https:\/\/gb25.eco.de\/en\/topics\/security\/","name":"Security - eco Gesch\u00e4ftsbericht 2025","isPartOf":{"@id":"https:\/\/gb25.eco.de\/#website"},"datePublished":"2023-07-14T11:11:14+00:00","dateModified":"2026-05-07T09:54:33+00:00","breadcrumb":{"@id":"https:\/\/gb25.eco.de\/en\/topics\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gb25.eco.de\/en\/topics\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gb25.eco.de\/en\/topics\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gb25.eco.de\/en\/"},{"@type":"ListItem","position":2,"name":"Topics","item":"https:\/\/gb25.eco.de\/en\/topics\/"},{"@type":"ListItem","position":3,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/gb25.eco.de\/#website","url":"https:\/\/gb25.eco.de\/","name":"eco Gesch\u00e4ftsbericht 2025","description":"","publisher":{"@id":"https:\/\/gb25.eco.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gb25.eco.de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gb25.eco.de\/#organization","name":"eco Gesch\u00e4ftsbericht 2025","url":"https:\/\/gb25.eco.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gb25.eco.de\/#\/schema\/logo\/image\/","url":"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/Logo_GB25.svg","contentUrl":"https:\/\/gb25.eco.de\/wp-content\/uploads\/sites\/16\/2026\/05\/Logo_GB25.svg","width":100,"height":100,"caption":"eco Gesch\u00e4ftsbericht 2025"},"image":{"@id":"https:\/\/gb25.eco.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/pages\/1493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/comments?post=1493"}],"version-history":[{"count":36,"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/pages\/1493\/revisions"}],"predecessor-version":[{"id":5594,"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/pages\/1493\/revisions\/5594"}],"up":[{"embeddable":true,"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/pages\/1557"}],"wp:attachment":[{"href":"https:\/\/gb25.eco.de\/en\/wp-json\/wp\/v2\/media?parent=1493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}