{"id":61973,"date":"2025-10-07T05:00:00","date_gmt":"2025-10-07T13:00:00","guid":{"rendered":"https:\/\/www.sumologic.com\/resources\/folge-13-jeder-macht-was-er-will-hoffnung-auf-eine-ki-zukunft"},"modified":"2026-02-10T11:56:19","modified_gmt":"2026-02-10T19:56:19","slug":"ep-13-everyone-is-winging-it-hope-for-an-ai-future","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/de\/podcast\/ep-13-everyone-is-winging-it-hope-for-an-ai-future","title":{"rendered":"Folge 13: Jeder macht, was er will: Hoffnung auf eine KI-Zukunft"},"content":{"rendered":"\n<p>n dieser Folge begr\u00fc\u00dfen wir Naomi Buckwalter, Sr. Director of Product Security bei Contrast Security. Wir sprechen \u00fcber die sich wandelnde Landschaft der Sicherheitsbedrohungen und die Doppelrolle von KI sowohl als Werkzeug f\u00fcr Angreifer als auch als Mittel zu deren Bek\u00e4mpfung. Wir untersuchen die zunehmende Raffinesse moderner Phishing-Angriffe und diskutieren, wie Sicherheitsteams sich schnell anpassen m\u00fcssen, um neuen Bedrohungen einen Schritt voraus zu sein. Zudem debattieren wir \u00fcber die transformativen Auswirkungen von KI auf den zuk\u00fcnftigen Arbeitsmarkt, auf dem pers\u00f6nliche Qualit\u00e4ten und Soft Skills gegen\u00fcber traditionellen technischen Kompetenzen zunehmend an Bedeutung gewinnen k\u00f6nnten.<\/p>\n\n<p>Lesen Sie mehr \u00fcber die Partnerschaft von Sumo Logic und Contrast: <a href=\"https:\/\/www.contrastsecurity.com\/security-influencers\/application-layer-attack-investigations-in-minutes-sumo-logic-and-contrast-security\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.contrastsecurity.com\/security-influencers\/application-layer-attack-investigations-in-minutes-sumo-logic-and-contrast-security<\/a><\/p>\n\n<p>Abonnieren Sie den Podcast: <a href=\"https:\/\/sumologic.com\/podcast\" data-type=\"link\" data-id=\"https:\/\/sumologic.com\/podcast\" target=\"_blank\" rel=\"noopener\">sumologic.com\/podcast<\/a><\/p>\n\n<p>Besuchen Sie <a href=\"https:\/\/sumologic.com\" data-type=\"link\" data-id=\"https:\/\/sumologic.com\" target=\"_blank\" rel=\"noopener\">sumologic.com<\/a><\/p>\n\n<p>Folgen Sie uns auf LinkedIn: <a href=\"https:\/\/www.linkedin.com\/company\/sumo-logic\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/sumo-logic\/<\/a><\/p>\n\n<p>Abonnieren Sie unseren YouTube-Kanal: <a href=\"https:\/\/www.youtube.com\/user\/sumologic\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/user\/sumologic<\/a><\/p>\n\n<p>Wenden Sie sich bei Fragen an <a href=\"mailto:podcast@sumologic.com\" target=\"_blank\" rel=\"noreferrer noopener\">podcast@sumologic.com<\/a><\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>n dieser Folge begr\u00fc\u00dfen wir Naomi Buckwalter, Sr. Director of Product Security bei Contrast Security. Wir sprechen \u00fcber die sich wandelnde Landschaft der Sicherheitsbedrohungen und die Doppelrolle von KI sowohl als Werkzeug f\u00fcr Angreifer als auch als Mittel zu deren Bek\u00e4mpfung. Wir untersuchen die zunehmende Raffinesse moderner Phishing-Angriffe und diskutieren, wie Sicherheitsteams sich schnell anpassen [&hellip;]<\/p>\n","protected":false},"author":372,"featured_media":53966,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[308],"resource-solution":[306],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[308],"resource-solution":[306],"class_list":["post-61973","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource-type-podcast","resource-solution-secops-and-security-de"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource\/61973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/53966"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=61973"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource-type?post=61973"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource-solution?post=61973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}