{"id":54869,"date":"2025-07-29T08:46:52","date_gmt":"2025-07-29T16:46:52","guid":{"rendered":"https:\/\/www.sumologic.com\/resources\/folge-3-cisos-hassen-ihre-sicherheitstools"},"modified":"2025-11-30T19:45:16","modified_gmt":"2025-12-01T03:45:16","slug":"ep-3-cisos-hate-their-security-tools","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/de\/podcast\/ep-3-cisos-hate-their-security-tools","title":{"rendered":"Folge 3: CISOs hassen ihre Sicherheitstools"},"content":{"rendered":"\n<p>F\u00fcr den Bericht 2025 Security Operations Insights von Sumo Logic wurden 500 IT- und Sicherheitsverantwortliche aus Unternehmen befragt, um herauszufinden, was in den SOCs von heute wirklich passiert. Begleiten Sie die Sicherheitsexperten Adam White, David Girvin und Zoe Hawkins, wenn sie die wichtigsten Ergebnisse des Berichts aufschl\u00fcsseln und das beleuchten, was jeder Analyst und CISO schon seit Jahren gef\u00fchlt hat: Das System braucht einen Reset.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>F\u00fcr den Bericht 2025 Security Operations Insights von Sumo Logic wurden 500 IT- und Sicherheitsverantwortliche aus Unternehmen befragt, um herauszufinden, was in den SOCs von heute wirklich passiert. Begleiten Sie die Sicherheitsexperten Adam White, David Girvin und Zoe Hawkins, wenn sie die wichtigsten Ergebnisse des Berichts aufschl\u00fcsseln und das beleuchten, was jeder Analyst und CISO [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":49580,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[308],"resource-solution":[306],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[308],"resource-solution":[306],"class_list":["post-54869","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource-type-podcast","resource-solution-secops-and-security-de"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource\/54869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/4"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/49580"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=54869"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource-type?post=54869"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource-solution?post=54869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}