{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www.iwelt.de\/category\/news\/#CollectionPage","headline":"News Category","description":"","url":"https:\/\/www.iwelt.de\/category\/news\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","headline":"Was ist eine Domain? Der umfassende Leitfaden f\u00fcr IT-Fachkr\u00e4fte","url":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","datePublished":"2026-03-30","dateModified":"2026-03-30","mainEntityOfPage":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-eine-domain.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-eine-domain.png","height":720,"width":1280},"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","headline":"Domain kaufen: Ihr strategischer Leitfaden f\u00fcr eine zukunftssichere Online-Pr\u00e4senz","url":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","datePublished":"2026-03-05","dateModified":"2026-03-05","mainEntityOfPage":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-kaufen-leitfaden.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-kaufen-leitfaden.png","height":720,"width":1280},"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","headline":"Was ist Phishing? Erkennen, verhindern &#038; E-Mail sch\u00fctzen","url":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","datePublished":"2026-02-25","dateModified":"2026-03-04","mainEntityOfPage":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-phishing.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-phishing.png","height":720,"width":1280},"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","headline":"Die Zukunft von TLS-Zertifikaten: Warum 47-Tage-Zertifikate kommen und wie Sie sich darauf vorbereiten","url":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","datePublished":"2026-02-12","dateModified":"2026-02-13","mainEntityOfPage":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/tls-ssl-zertifikate-neu.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/tls-ssl-zertifikate-neu.png","height":720,"width":1280},"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","headline":"\u00c4nderungen bei der DENIC Domainabfrage und was dies f\u00fcr Unternehmen bedeutet","url":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","datePublished":"2025-12-17","dateModified":"2025-12-17","mainEntityOfPage":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/denic-domainabfrage-aenderungen.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/denic-domainabfrage-aenderungen.png","height":720,"width":1280},"keywords":["Cybersecurity"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","headline":"NIS-2-Umsetzungsgesetz: Neue Standards f\u00fcr Cybersicherheit in Deutschland","url":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","datePublished":"2025-11-21","dateModified":"2025-11-25","mainEntityOfPage":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/nis-2-richtlinie.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/nis-2-richtlinie.png","height":720,"width":1280},"keywords":["Cybersecurity"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","headline":"Premium DNS \u2013 Warum sich ein Upgrade wirklich lohnt","url":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","datePublished":"2025-10-10","dateModified":"2025-10-16","mainEntityOfPage":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/premium-dns.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/premium-dns.png","height":720,"width":1280},"keywords":["dns"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/25-jahre-iwelt-ein-rueckblick-auf-unsere-geschichte\/","headline":"25 Jahre iWelt \u2013 ein R\u00fcckblick auf unsere Geschichte","url":"https:\/\/www.iwelt.de\/25-jahre-iwelt-ein-rueckblick-auf-unsere-geschichte\/","datePublished":"2025-09-02","dateModified":"2025-12-10","mainEntityOfPage":"https:\/\/www.iwelt.de\/25-jahre-iwelt-ein-rueckblick-auf-unsere-geschichte\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/25-jahre-iwelt.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/25-jahre-iwelt.png","height":720,"width":1280},"keywords":["iWelt"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/icann-registration-data-policy-2025\/","headline":"ICANN Registration Data Policy 2025: Was Domaininhaber jetzt wissen und tun m\u00fcssen","url":"https:\/\/www.iwelt.de\/icann-registration-data-policy-2025\/","datePublished":"2025-08-19","dateModified":"2025-08-20","mainEntityOfPage":"https:\/\/www.iwelt.de\/icann-registration-data-policy-2025\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-icann-aenderung.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-icann-aenderung.png","height":720,"width":1280},"keywords":["Domain","KMU"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/sind-ihre-unternehmensdaten-sicher-diese-checkliste-hilft\/","headline":"Sind Ihre Daten sicher? Diese Checkliste gibt die Antwort.","url":"https:\/\/www.iwelt.de\/sind-ihre-unternehmensdaten-sicher-diese-checkliste-hilft\/","datePublished":"2025-05-21","dateModified":"2025-05-21","mainEntityOfPage":"https:\/\/www.iwelt.de\/sind-ihre-unternehmensdaten-sicher-diese-checkliste-hilft\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/checkliste-wie-gut-sind-ihre-unternehmensdaten-geschuetzt.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/checkliste-wie-gut-sind-ihre-unternehmensdaten-geschuetzt.png","height":800,"width":1200},"keywords":["backup","backup-management","Cybersecurity","veeam"]}]}