<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.bithawk.ch/it-security/microsoft-stellt-f%C3%BCr-%C3%A4ltere-produkte-den-support-ein</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2019-12-20</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/citrix-sicherheitsl%C3%BCcke-cve-2019-19781</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus%20Fumasoli.jpg</image:loc><image:caption>MarkusFumasoli</image:caption><image:title>MarkusFumasoli</image:title></image:image><lastmod>2020-01-06</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/100-tage-mit-copilot-for-microsoft-365</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_100Tage_Copilot_600x303-1.jpg</image:loc><image:caption>Blog100TageCopilot600x3031</image:caption><image:title>Blog100TageCopilot600x3031</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_100Tage_Copilot_2400x600-3.jpg</image:loc><image:caption>Blog100TageCopilot2400x6003</image:caption><image:title>Blog100TageCopilot2400x6003</image:title></image:image><lastmod>2024-07-08</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/servicenow-access-control-lists</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Martin-Estermann_320x320.jpg</image:loc><image:caption>MartinEstermann320x320</image:caption><image:title>MartinEstermann320x320</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2023-10-20</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/erfolgsfaktoren-einer-digitalen-transformation</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Claudio_Addario.jpg</image:loc><image:caption>ClaudioAddario</image:caption><image:title>ClaudioAddario</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/181231_Headerbilder/BL_Erfolgsfaktoren_DT_1440x400.jpg</image:loc><image:caption>BLErfolgsfaktorenDT1440x400</image:caption><image:title>BLErfolgsfaktorenDT1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Digitale_Transformation/Bericht%20ADC_KLEIN.jpg</image:loc><image:caption>BerichtADCKLEIN</image:caption><image:title>BerichtADCKLEIN</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Erfolgsfaktoren_DT_1440x400-1.jpg</image:loc><image:caption>BLErfolgsfaktorenDT1440x4001</image:caption><image:title>BLErfolgsfaktorenDT1440x4001</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/2024-12-05-19_Trends2025.jpg</image:loc><image:caption>2024120519Trends2025</image:caption><image:title>2024120519Trends2025</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Bild%20ServiceNow%20Blog.jpg</image:loc><image:caption>HeaderBildServiceNowBlog</image:caption><image:title>HeaderBildServiceNowBlog</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BitHawk_November2018%20Theme/Images/MG_5711-v2__FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd.jpg</image:loc><image:caption>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:caption><image:title>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_2024-10-31_AIOps_600x303.jpg</image:loc><image:caption>Blog20241031AIOps600x303</image:caption><image:title>Blog20241031AIOps600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_2024-11-21_Edge%20Computing_600x303-1.jpg</image:loc><image:caption>Blog20241121EdgeComputing600x3031</image:caption><image:title>Blog20241121EdgeComputing600x3031</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Paris_Release_ServiceNo_2400x600-1.jpg</image:loc><image:caption>ParisReleaseServiceNo2400x6001</image:caption><image:title>ParisReleaseServiceNo2400x6001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_B-rigthsource_600x303px.jpg</image:loc><image:caption>SecurityBrigthsource600x303px</image:caption><image:title>SecurityBrigthsource600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-ServiceNow-Automation_600x303px_o-Logo.jpg</image:loc><image:caption>WebinarServiceNowAutomation600x303pxoLogo</image:caption><image:title>WebinarServiceNowAutomation600x303pxoLogo</image:title></image:image><lastmod>2024-10-30</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/petitpotam-/-lsa-spoofing-update-verf%C3%BCgbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-08-18</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/use-cases-zur-digitalen-kundenansprache</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_UseCasesKundenansprache_1440x400.jpg</image:loc><image:caption>BLUseCasesKundenansprache1440x400</image:caption><image:title>BLUseCasesKundenansprache1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_UseCasesKundenansprache_1440x400-2.jpg</image:loc><image:caption>BLUseCasesKundenansprache1440x4002</image:caption><image:title>BLUseCasesKundenansprache1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/on-the-fast-lane-microsoft-teams</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Stalder-Remo.jpg</image:loc><image:caption>StalderRemo</image:caption><image:title>StalderRemo</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_5Erfolgsfaktoren-Microsoft-Teams_1440x400-3.jpg</image:loc><image:caption>BL5ErfolgsfaktorenMicrosoftTeams1440x4003</image:caption><image:title>BL5ErfolgsfaktorenMicrosoftTeams1440x4003</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_5Erfolgsfaktoren-Microsoft-Teams_1440x400.jpg</image:loc><image:caption>BL5ErfolgsfaktorenMicrosoftTeams1440x400</image:caption><image:title>BL5ErfolgsfaktorenMicrosoftTeams1440x400</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsl%C3%BCcke-cisco-expressway-series-telepresence-vcs-produkten</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2022-03-03</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/gefahrenpotential-hoch-netlogon-elevation-of-privilege-vulnerability</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2020-09-17</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/5-tipps-f%C3%BCr-ein-erfolgreiches-backup-konzept</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Backup_Blog.jpg</image:loc><image:caption>BackupBlog</image:caption><image:title>BackupBlog</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Backup.jpg</image:loc><image:caption>HeaderBackup</image:caption><image:title>HeaderBackup</image:title></image:image><lastmod>2020-03-02</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/5-tipps-f%C3%BCr-ihre-it-sicherheit</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Tipps-gegen-Ransomware_1440x400.jpg</image:loc><image:caption>BLTippsgegenRansomware1440x400</image:caption><image:title>BLTippsgegenRansomware1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Tipps-gegen-Ransomware_1440x400-1.jpg</image:loc><image:caption>BLTippsgegenRansomware1440x4001</image:caption><image:title>BLTippsgegenRansomware1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Marco-Meier.jpg</image:loc><image:caption>MarcoMeier</image:caption><image:title>MarcoMeier</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/servicenow-hebt-sich-weiter-vom-wettbewerb-ab</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Patrik-Basler_300x300.jpg</image:loc><image:caption>PatrikBasler300x300</image:caption><image:title>PatrikBasler300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ServiceNow-ForresterWave_2400x600.jpg</image:loc><image:caption>ServiceNowForresterWave2400x600</image:caption><image:title>ServiceNowForresterWave2400x600</image:title></image:image><lastmod>2019-10-24</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/zukunftsbest%C3%A4ndige-it-multi-cloud</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Zukunftsbest%C3%A4ndige_IT_Multi-Cloud-Bombelka_600x303.jpg</image:loc><image:caption>ZukunftsbeständigeITMultiCloudBombelka600x303</image:caption><image:title>ZukunftsbeständigeITMultiCloudBombelka600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Milos-Maksimovic300x300.jpg</image:loc><image:caption>MilosMaksimovic300x300</image:caption><image:title>MilosMaksimovic300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Zukunftsbest%C3%A4ndige_IT_Multi-Cloud-Bombelka_600x303-1.jpg</image:loc><image:caption>ZukunftsbeständigeITMultiCloudBombelka600x3031</image:caption><image:title>ZukunftsbeständigeITMultiCloudBombelka600x3031</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/MultiCloud_%C3%9Cbersicht.png</image:loc><image:caption>MultiCloudÜbersicht</image:caption><image:title>MultiCloudÜbersicht</image:title></image:image><lastmod>2024-09-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sch%C3%BCtzen-sie-ihre-vpns-vor-akira-ransomware-angriffen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/MFA-Featurebild_600x303px.jpg</image:loc><image:caption>MFAFeaturebild600x303px</image:caption><image:title>MFAFeaturebild600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/MFA-Headerbild_2400x600px-1.jpg</image:loc><image:caption>MFAHeaderbild2400x600px1</image:caption><image:title>MFAHeaderbild2400x600px1</image:title></image:image><lastmod>2023-09-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/achtung-qr-codes-locken-in-die-phishing-falle</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Phishing-Plakat-600x303.jpg</image:loc><image:caption>PhishingPlakat600x303</image:caption><image:title>PhishingPlakat600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Phishing-Plakat-2400x600px.jpg</image:loc><image:caption>PhishingPlakat2400x600px</image:caption><image:title>PhishingPlakat2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Phishing%20QR-Code-x.jpg</image:loc><image:caption>PhishingQRCodex</image:caption><image:title>PhishingQRCodex</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2023-10-04</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/zerto-arbeiten-ohne-systemunterbr%C3%BCche</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/OnDemandVideo_Zerto_MarkusArnold_2400x800px-2-3.jpg</image:loc><image:caption>OnDemandVideoZertoMarkusArnold2400x800px23</image:caption><image:title>OnDemandVideoZertoMarkusArnold2400x800px23</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><lastmod>2020-08-19</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/microsoft-inspire-2023</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bing%20Chat%20Enterprise.jpg</image:loc><image:caption>BingChatEnterprise</image:caption><image:title>BingChatEnterprise</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft365%20Copilot%20system.jpg</image:loc><image:caption>Microsoft365Copilotsystem</image:caption><image:title>Microsoft365Copilotsystem</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Technologie_erleichtertesLeben_2400x800.jpg</image:loc><image:caption>TechnologieerleichtertesLeben2400x800</image:caption><image:title>TechnologieerleichtertesLeben2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Nicola.jpg</image:loc><image:caption>Nicola</image:caption><image:title>Nicola</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/weitere%20Copilots.jpg</image:loc><image:caption>weitereCopilots</image:caption><image:title>weitereCopilots</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Technologie_erleichtertesLeben_600x303.jpg</image:loc><image:caption>TechnologieerleichtertesLeben600x303</image:caption><image:title>TechnologieerleichtertesLeben600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Sales%20CoPilot.jpg</image:loc><image:caption>SalesCoPilot</image:caption><image:title>SalesCoPilot</image:title></image:image><lastmod>2023-08-04</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/microsoft-passt-m365-subscriptions-preise-an</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Off365-Blog_2400x600.jpg</image:loc><image:caption>MicrosoftOff365Blog2400x600</image:caption><image:title>MicrosoftOff365Blog2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Off365-Blog_600x303.jpg</image:loc><image:caption>MicrosoftOff365Blog600x303</image:caption><image:title>MicrosoftOff365Blog600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Heiri-B%C3%A4ttig.jpg</image:loc><image:caption>HeiriBättig</image:caption><image:title>HeiriBättig</image:title></image:image><lastmod>2022-01-28</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/trend-micro-schlie%C3%9Ft-zwei-schwachstellen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2019-10-30</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/nas-ger%C3%A4te-als-beliebte-schwachstelle-im-unternehmensnetzwerk</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/panik-kein-guter-ratgeber-ist-ihr-business-f%C3%BCr-it-notf%C3%A4lle-ger%C3%BCstet</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus%20Arnold.jpg</image:loc><image:caption>MarkusArnold</image:caption><image:title>MarkusArnold</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-MarkusArnold-Huhn_600x303.jpg</image:loc><image:caption>BlogMarkusArnoldHuhn600x303</image:caption><image:title>BlogMarkusArnoldHuhn600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BMC-1.jpg</image:loc><image:caption>BMC1</image:caption><image:title>BMC1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-MarkusArnold-Huhn.jpg</image:loc><image:caption>BlogMarkusArnoldHuhn</image:caption><image:title>BlogMarkusArnoldHuhn</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-MarkusArnold-Huhn-1.jpg</image:loc><image:caption>BlogMarkusArnoldHuhn1</image:caption><image:title>BlogMarkusArnoldHuhn1</image:title></image:image><lastmod>2021-11-08</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/haben-sie-lizenzen-und-vertr%C3%A4ge-im-griff</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Licensing_2400x600.jpg</image:loc><image:caption>BlogLicensing2400x600</image:caption><image:title>BlogLicensing2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Licensing_2400x600-1.jpg</image:loc><image:caption>BlogLicensing2400x6001</image:caption><image:title>BlogLicensing2400x6001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Licensing_TextBild_800x234.jpg</image:loc><image:caption>LicensingTextBild800x234</image:caption><image:title>LicensingTextBild800x234</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Heiri-B%C3%A4ttig.jpg</image:loc><image:caption>HeiriBättig</image:caption><image:title>HeiriBättig</image:title></image:image><lastmod>2020-04-24</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/zukunftsbest%C3%A4ndige-it-%C3%BCbersicht-aktueller-it-trends</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/IT-Trends_2400x600.jpg</image:loc><image:caption>ITTrends2400x600</image:caption><image:title>ITTrends2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><lastmod>2024-07-23</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/cora-der-intelligente-it-automat-by-pidas</loc><video:video><video:thumbnail_loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/PIDAS%20by%20CORA%20Plugin%20Demo.mp4/medium.jpg</video:thumbnail_loc><video:title>PIDAS by CORA Plugin Demo</video:title><video:description>PIDAS by CORA Plugin Demo</video:description><video:content_loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/PIDAS%20by%20CORA%20Plugin%20Demo.mp4</video:content_loc><video:duration>42</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Fabian-N%C3%A4f.jpg</image:loc><image:caption>FabianNäf</image:caption><image:title>FabianNäf</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cora_ITAutomat_kombi.jpg</image:loc><image:caption>CoraITAutomatkombi</image:caption><image:title>CoraITAutomatkombi</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-ServiceNow-Automation_600x303px_o-Logo.jpg</image:loc><image:caption>WebinarServiceNowAutomation600x303pxoLogo</image:caption><image:title>WebinarServiceNowAutomation600x303pxoLogo</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-ServiceNow-Automation_2400x800px-o-Logo.jpg</image:loc><image:caption>WebinarServiceNowAutomation2400x800pxoLogo</image:caption><image:title>WebinarServiceNowAutomation2400x800pxoLogo</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/citrix-informiert-%C3%BCber-kritische-schwachstelle-in-netscaler-gateway-und-netscaler-adc-cve-2025-6543</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2025-06-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/erste-updates-f%C3%BCr-cve-2024-6387-in-openssh-verf%C3%BCgbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2024-08-12</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SharePointOnline_600x303.jpg</image:loc><image:caption>BlogSharePointOnline600x303</image:caption><image:title>BlogSharePointOnline600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Exchange-Online_600x303px-1.jpg</image:loc><image:caption>ExchangeOnline600x303px1</image:caption><image:title>ExchangeOnline600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BLOG_Citrix-LAS_600x303.jpg</image:loc><image:caption>BLOGCitrixLAS600x303</image:caption><image:title>BLOGCitrixLAS600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BLOG_ACM-erfolgreiche-Technologieeinf%C3%BChrung_600x303.jpg</image:loc><image:caption>BLOGACMerfolgreicheTechnologieeinführung600x303</image:caption><image:title>BLOGACMerfolgreicheTechnologieeinführung600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_M365-TeamsGovernance_600x303.jpg</image:loc><image:caption>BlogM365TeamsGovernance600x303</image:caption><image:title>BlogM365TeamsGovernance600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/VeeamDataCloud-Blog_600x303.jpg</image:loc><image:caption>VeeamDataCloudBlog600x303</image:caption><image:title>VeeamDataCloudBlog600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Verk%C3%BCrzteLaufzeiten_PublicZertifikate_600x300.jpg</image:loc><image:caption>VerkürzteLaufzeitenPublicZertifikate600x300</image:caption><image:title>VerkürzteLaufzeitenPublicZertifikate600x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Windows10-EndofLife_2025_600x303.png</image:loc><image:caption>Windows10EndofLife2025600x303</image:caption><image:title>Windows10EndofLife2025600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BitHawk_November2018%20Theme/Images/MG_5711-v2__FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd.jpg</image:loc><image:caption>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:caption><image:title>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Licensing_2400x600-1.jpg</image:loc><image:caption>BlogLicensing2400x6001</image:caption><image:title>BlogLicensing2400x6001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cloud%20und%20seine%20Schattenseite_600x303.jpg</image:loc><image:caption>CloudundseineSchattenseite600x303</image:caption><image:title>CloudundseineSchattenseite600x303</image:title></image:image><lastmod>2025-01-16</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/end-of-life-von-windows-10-was-sie-wissen-m%C3%BCssen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Windows10-EndofLife_2025_600x303.png</image:loc><image:caption>Windows10EndofLife2025600x303</image:caption><image:title>Windows10EndofLife2025600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus%20Fumasoli.jpg</image:loc><image:caption>MarkusFumasoli</image:caption><image:title>MarkusFumasoli</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Windows10-EndofLife_2025_2400x600-1.jpg</image:loc><image:caption>Windows10EndofLife20252400x6001</image:caption><image:title>Windows10EndofLife20252400x6001</image:title></image:image><lastmod>2025-03-06</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/nist-cybersecurity-framework-2.0-das-ist-neu-</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/nist-roadmap_1.jpg</image:loc><image:caption>nistroadmap1</image:caption><image:title>nistroadmap1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/undefined-Feb-29-2024-07-26-50-7270-AM.png</image:loc><image:caption>undefinedFeb2920240726507270AM</image:caption><image:title>undefinedFeb2920240726507270AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/undefined-Feb-29-2024-07-27-34-3798-AM.png</image:loc><image:caption>undefinedFeb2920240727343798AM</image:caption><image:title>undefinedFeb2920240727343798AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/NIST-2.0-Categories.png</image:loc><image:caption>NIST20Categories</image:caption><image:title>NIST20Categories</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/NIST_V3_2400x800px.jpg</image:loc><image:caption>NISTV32400x800px</image:caption><image:title>NISTV32400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/nist.jpg</image:loc><image:caption>nist</image:caption><image:title>nist</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/undefined-Feb-29-2024-07-26-08-4343-AM.png</image:loc><image:caption>undefinedFeb2920240726084343AM</image:caption><image:title>undefinedFeb2920240726084343AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/NIST_V2_600x300px.jpg</image:loc><image:caption>NISTV2600x300px</image:caption><image:title>NISTV2600x300px</image:title></image:image><lastmod>2024-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/zukunftsbest%C3%A4ndige-it-die-neue-rolle-in-unternehmen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/InterneITBr%C3%BCckenbauer_2400x800.jpg</image:loc><image:caption>InterneITBrückenbauer2400x800</image:caption><image:title>InterneITBrückenbauer2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/InterneITBr%C3%BCckenbauer_600-300px..jpg</image:loc><image:caption>InterneITBrückenbauer600300px</image:caption><image:title>InterneITBrückenbauer600300px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><lastmod>2024-05-02</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/veeam-informiert-%C3%BCber-eine-kritische-schwachstelle-cve-2025-23121</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2025-06-18</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstellen-auf-cisco-asa-und-ftd-bei-web-services</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px.jpg</image:loc><image:caption>SecurityStandart600x303px</image:caption><image:title>SecurityStandart600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Autorenprofil_H%C3%A4nggi_Patrik.jpg</image:loc><image:caption>AutorenprofilHänggiPatrik</image:caption><image:title>AutorenprofilHänggiPatrik</image:title></image:image><lastmod>2021-05-04</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/8-bereiche-welche-ihre-branche-auf-den-kopf-stellen-werden</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Digitale_Transformation/Bild%20Blog%20Terry_2_2017.jpg</image:loc><image:caption>BildBlogTerry22017</image:caption><image:title>BildBlogTerry22017</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_8Bereiche-Branche-Kopf-stellen_1440x400.jpg</image:loc><image:caption>BL8BereicheBrancheKopfstellen1440x400</image:caption><image:title>BL8BereicheBrancheKopfstellen1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_8Bereiche-Branche-Kopf-stellen_1440x400-1.jpg</image:loc><image:caption>BL8BereicheBrancheKopfstellen1440x4001</image:caption><image:title>BL8BereicheBrancheKopfstellen1440x4001</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/digitale-ambivalenz</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Claudio_Addario.jpg</image:loc><image:caption>ClaudioAddario</image:caption><image:title>ClaudioAddario</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Digitale-Ambivalenz_1440x400_NEU-1.jpg</image:loc><image:caption>DigitaleAmbivalenz1440x400NEU1</image:caption><image:title>DigitaleAmbivalenz1440x400NEU1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Digitale-Ambivalenz_1440x400_NEU.jpg</image:loc><image:caption>DigitaleAmbivalenz1440x400NEU</image:caption><image:title>DigitaleAmbivalenz1440x400NEU</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/neue-wi-fi-6-technologie-von-cisco-meraki</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Headerbild_WIFI6_Cisco_Merak_2400x600.jpg</image:loc><image:caption>HeaderbildWIFI6CiscoMerak2400x600</image:caption><image:title>HeaderbildWIFI6CiscoMerak2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Headerbild_WIFI6_Cisco_Merak_2400x600-1.jpg</image:loc><image:caption>HeaderbildWIFI6CiscoMerak2400x6001</image:caption><image:title>HeaderbildWIFI6CiscoMerak2400x6001</image:title></image:image><lastmod>2019-05-02</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/hpe-greenlake-wenn-sich-die-it-ihrer-unternehmung-anpasst</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/OnDemandVideo_HPE_Greenlake_Claudio_2400x800px-2-2.jpg</image:loc><image:caption>OnDemandVideoHPEGreenlakeClaudio2400x800px22</image:caption><image:title>OnDemandVideoHPEGreenlakeClaudio2400x800px22</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-in-der-sam-datenbank-in-windows</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-07-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/cve-2020-16898-bekannt-als-bad-neighbor</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><lastmod>2020-10-15</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/neue-scan-aktivit%C3%A4ten-auf-verwundbare-microsoft-exchange-server</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Tweet_NSCS.jpg</image:loc><image:caption>TweetNSCS</image:caption><image:title>TweetNSCS</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2021-08-29</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/erfolgreich-in-die-zukunft-navigieren</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Erfolgreich-Zukunft-navigieren_1440x400.jpg</image:loc><image:caption>BLErfolgreichZukunftnavigieren1440x400</image:caption><image:title>BLErfolgreichZukunftnavigieren1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Erfolgreich-Zukunft-navigieren_1440x400-4.jpg</image:loc><image:caption>BLErfolgreichZukunftnavigieren1440x4004</image:caption><image:title>BLErfolgreichZukunftnavigieren1440x4004</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/5-erfolgsfaktoren-der-einf%C3%BChrung-von-microsoft-teams</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_5Erfolgsfaktoren-Microsoft-Teams_1440x400.jpg</image:loc><image:caption>BL5ErfolgsfaktorenMicrosoftTeams1440x400</image:caption><image:title>BL5ErfolgsfaktorenMicrosoftTeams1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_5Erfolgsfaktoren-Microsoft-Teams_1440x400-2.jpg</image:loc><image:caption>BL5ErfolgsfaktorenMicrosoftTeams1440x4002</image:caption><image:title>BL5ErfolgsfaktorenMicrosoftTeams1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Stalder-Remo.jpg</image:loc><image:caption>StalderRemo</image:caption><image:title>StalderRemo</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/retail-hospitality</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BitHawk_November2018%20Theme/Images/MG_5711-v2__FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd.jpg</image:loc><image:caption>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:caption><image:title>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:title></image:image><lastmod>2018-12-11</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/change-management-schl%C3%BCssel-zum-erfolg</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/microsoft-teams-ein-player-f%C3%BCr-ihr-team</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar_Microsoft-Teams_600x303-2.jpg</image:loc><image:caption>WebinarMicrosoftTeams600x3032</image:caption><image:title>WebinarMicrosoftTeams600x3032</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar_Microsoft-Teams_2400x800.jpg</image:loc><image:caption>WebinarMicrosoftTeams2400x800</image:caption><image:title>WebinarMicrosoftTeams2400x800</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/was-die-old-economy-von-startups-lernt</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_OldEconomy_1440x400-NEU-1.jpg</image:loc><image:caption>BLOldEconomy1440x400NEU1</image:caption><image:title>BLOldEconomy1440x400NEU1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild%20Mario%20F%C3%A4h.jpg</image:loc><image:caption>BildMarioFäh</image:caption><image:title>BildMarioFäh</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_OldEconomy_1440x400.jpg</image:loc><image:caption>BLOldEconomy1440x400</image:caption><image:title>BLOldEconomy1440x400</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-configmgr-sccm-patch-management-redesign</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-08-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstelle-in-netscaler-adc-und-netscaler-gateway</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><lastmod>2023-07-20</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/der-copilot-chat-neue-dimensionen-der-zusammenarbeit-mit-agents</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Thomas-Koch_300x300.jpg</image:loc><image:caption>ThomasKoch300x300</image:caption><image:title>ThomasKoch300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_ZusammenarbeitmitAgents_2400x600.jpg</image:loc><image:caption>BlogZusammenarbeitmitAgents2400x600</image:caption><image:title>BlogZusammenarbeitmitAgents2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_ZusammenarbeitmitAgents_600x303.jpg</image:loc><image:caption>BlogZusammenarbeitmitAgents600x303</image:caption><image:title>BlogZusammenarbeitmitAgents600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/undefined-Feb-17-2025-01-47-33-2190-PM.png</image:loc><image:caption>undefinedFeb1720250147332190PM</image:caption><image:title>undefinedFeb1720250147332190PM</image:title></image:image><lastmod>2025-02-18</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/next-component-local-development-setup</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ServiceNow%20Blog%20Components.png</image:loc><image:caption>ServiceNowBlogComponents</image:caption><image:title>ServiceNowBlogComponents</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Bild%20ServiceNow%20Blog.jpg</image:loc><image:caption>HeaderBildServiceNowBlog</image:caption><image:title>HeaderBildServiceNowBlog</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Jesse-Szepieniec-300x300.jpg</image:loc><image:caption>JesseSzepieniec300x300</image:caption><image:title>JesseSzepieniec300x300</image:title></image:image><lastmod>2023-03-02</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/mitarbeiter-ihre-beste-waffe-gegen-phishing</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security-Fishing_Awarness_800x234.jpg</image:loc><image:caption>SecurityFishingAwarness800x234</image:caption><image:title>SecurityFishingAwarness800x234</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-FES_600x303.jpg</image:loc><image:caption>BlogFES600x303</image:caption><image:title>BlogFES600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Sabine-Feer_320x320.jpg</image:loc><image:caption>SabineFeer320x320</image:caption><image:title>SabineFeer320x320</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_FES_2400x800.jpg</image:loc><image:caption>BlogFES2400x800</image:caption><image:title>BlogFES2400x800</image:title></image:image><lastmod>2022-04-07</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/migration-vom-file-server-zu-sharepoint-online-methoden-und-tools</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SharePointOnline_2400x600.jpg</image:loc><image:caption>BlogSharePointOnline2400x600</image:caption><image:title>BlogSharePointOnline2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SharePointOnline_600x303.jpg</image:loc><image:caption>BlogSharePointOnline600x303</image:caption><image:title>BlogSharePointOnline600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ACM1%20(002).png</image:loc><image:caption>ACM1002</image:caption><image:title>ACM1002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Terminologiespeicher1.1%20(002)-1.png</image:loc><image:caption>Terminologiespeicher110021</image:caption><image:title>Terminologiespeicher110021</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Eugen-Spuling_300x300ps.jpg</image:loc><image:caption>EugenSpuling300x300ps</image:caption><image:title>EugenSpuling300x300ps</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Inhaltstypen1%20(002)-1.png</image:loc><image:caption>Inhaltstypen10021</image:caption><image:title>Inhaltstypen10021</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Inhaltstypen2.1%20(002).png</image:loc><image:caption>Inhaltstypen21002</image:caption><image:title>Inhaltstypen21002</image:title></image:image><lastmod>2024-12-03</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicheres-surfen-mit-cisco-umbrella</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Umbrella/Grafik-2.jpg</image:loc><image:caption>Grafik2</image:caption><image:title>Grafik2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Umbrella/Grafik-3.jpg</image:loc><image:caption>Grafik3</image:caption><image:title>Grafik3</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Umbrella/Security-Bild_Text.jpg</image:loc><image:caption>SecurityBildText</image:caption><image:title>SecurityBildText</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Umbrella/Grafik-4.jpg</image:loc><image:caption>Grafik4</image:caption><image:title>Grafik4</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Umbrella/Grafik-1.jpg</image:loc><image:caption>Grafik1</image:caption><image:title>Grafik1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Robert_Penski-1.png</image:loc><image:caption>RobertPenski1</image:caption><image:title>RobertPenski1</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/zukunftsbest%C3%A4ndige-it-trends-f%C3%BCr-2025-teil-1</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/2024-12-05-19_Trends2025.jpg</image:loc><image:caption>2024120519Trends2025</image:caption><image:title>2024120519Trends2025</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild5-1.png</image:loc><image:caption>Bild51</image:caption><image:title>Bild51</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/2024-12-05-19_Trends2025.png</image:loc><image:caption>2024120519Trends2025</image:caption><image:title>2024120519Trends2025</image:title></image:image><lastmod>2024-12-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstellen-in-fortinet-produken-cve-2025-59718-und-cve-2025-59719</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/joshua_Haefliger.png</image:loc><image:caption>joshuaHaefliger</image:caption><image:title>joshuaHaefliger</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2026-01-29</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstelle-in-openssl-3.x-cve-2025-15467</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2026-02-04</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-schliesst-schwachstelle-printnightmare</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-07-07</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/risikofaktor-mensch-insider-attacken-verhindern</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Jahrzente_Designfehler_1440x400-3.jpg</image:loc><image:caption>BLJahrzenteDesignfehler1440x4003</image:caption><image:title>BLJahrzenteDesignfehler1440x4003</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Kris_Kormany-1.jpg</image:loc><image:caption>KrisKormany1</image:caption><image:title>KrisKormany1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Jahrzente_Designfehler_1440x400.jpg</image:loc><image:caption>BLJahrzenteDesignfehler1440x400</image:caption><image:title>BLJahrzenteDesignfehler1440x400</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/bithawk-filedrop-in-azure</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/8_erfolgreicher%20Upload.jpg</image:loc><image:caption>8erfolgreicherUpload</image:caption><image:title>8erfolgreicherUpload</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/FileDrop_1440x400px.jpg</image:loc><image:caption>FileDrop1440x400px</image:caption><image:title>FileDrop1440x400px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/6_Daten_%C3%9Cberpr%C3%BCfung-4.jpg</image:loc><image:caption>6DatenÜberprüfung4</image:caption><image:title>6DatenÜberprüfung4</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/4_Daten_Verf%C3%BCgbarkeit.jpg</image:loc><image:caption>4DatenVerfügbarkeit</image:caption><image:title>4DatenVerfügbarkeit</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/FileDrop_2400x600px.jpg</image:loc><image:caption>FileDrop2400x600px</image:caption><image:title>FileDrop2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/9_Email_sendenan.jpg</image:loc><image:caption>9Emailsendenan</image:caption><image:title>9Emailsendenan</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/1_Login_FileDrop.jpg</image:loc><image:caption>1LoginFileDrop</image:caption><image:title>1LoginFileDrop</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/2_Daten_laden.jpg</image:loc><image:caption>2Datenladen</image:caption><image:title>2Datenladen</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/5_Benachrichtigung%20Daten-1.jpg</image:loc><image:caption>5BenachrichtigungDaten1</image:caption><image:title>5BenachrichtigungDaten1</image:title></image:image><lastmod>2019-09-06</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/die-schwachstelle-log4shell</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_2400x600px-1.jpg</image:loc><image:caption>BlogSecScorecard2400x600px1</image:caption><image:title>BlogSecScorecard2400x600px1</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/broadcom-informiert-%C3%BCber-kritische-schwachstellen-in-vmware-esxi-cve-2025-41236-cve-2025-41237-cve-2025-41238</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2025-07-18</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/authenticating-against-the-servicenow-api-with-session-tokens</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Jesse-Szepieniec-300x300.jpg</image:loc><image:caption>JesseSzepieniec300x300</image:caption><image:title>JesseSzepieniec300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Bild%20ServiceNow%20Blog.jpg</image:loc><image:caption>HeaderBildServiceNowBlog</image:caption><image:title>HeaderBildServiceNowBlog</image:title></image:image><lastmod>2023-09-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/cisco-schwachstellen-bedrohen-diverse-produkte</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_1440x600px.jpg</image:loc><image:caption>BlogSecScorecard1440x600px</image:caption><image:title>BlogSecScorecard1440x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-11-12</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/verk%C3%BCrzte-laufzeiten-von-public-zertifikaten-wichtig-zu-wissen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Verk%C3%BCrzteLaufzeiten_PublicZertifikate_2400x600px.jpg</image:loc><image:caption>VerkürzteLaufzeitenPublicZertifikate2400x600px</image:caption><image:title>VerkürzteLaufzeitenPublicZertifikate2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Verk%C3%BCrzteLaufzeiten_PublicZertifikate_600x300.jpg</image:loc><image:caption>VerkürzteLaufzeitenPublicZertifikate600x300</image:caption><image:title>VerkürzteLaufzeitenPublicZertifikate600x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Stefan-Thoma_300x300.jpg</image:loc><image:caption>StefanThoma300x300</image:caption><image:title>StefanThoma300x300</image:title></image:image><lastmod>2026-02-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/conditional-access-block-device-code-flow</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Silverfort_2400x600.jpg</image:loc><image:caption>BlogSilverfort2400x600</image:caption><image:title>BlogSilverfort2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Silvan-Buehler_300x300.jpg</image:loc><image:caption>SilvanBuehler300x300</image:caption><image:title>SilvanBuehler300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Silverfort_600x303-1.jpg</image:loc><image:caption>BlogSilverfort600x3031</image:caption><image:title>BlogSilverfort600x3031</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/servicenow-setzt-ihre-workflows-ins-zentrum</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/OnDemandVideo_ServiceNow_2400x800-1px.jpg</image:loc><image:caption>OnDemandVideoServiceNow2400x8001px</image:caption><image:title>OnDemandVideoServiceNow2400x8001px</image:title></image:image><lastmod>2020-09-01</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/einfache-online-meetings-mit-cisco-webex-meetings</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webex_2400x600.jpg</image:loc><image:caption>Webex2400x600</image:caption><image:title>Webex2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webex_560x343.jpg</image:loc><image:caption>Webex560x343</image:caption><image:title>Webex560x343</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Autorenprofil_H%C3%A4nggi_Patrik.jpg</image:loc><image:caption>AutorenprofilHänggiPatrik</image:caption><image:title>AutorenprofilHänggiPatrik</image:title></image:image><lastmod>2019-10-24</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/office-365-verabschiedet-veraltete-tls-version</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild-Microsoft_1440x400-1.jpg</image:loc><image:caption>BildMicrosoft1440x4001</image:caption><image:title>BildMicrosoft1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft_1.jpg</image:loc><image:caption>Microsoft1</image:caption><image:title>Microsoft1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/cloud-managed-networks</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Headerbild_ODW_CiscoMeraki_2400x800-1.jpg</image:loc><image:caption>HeaderbildODWCiscoMeraki2400x8001</image:caption><image:title>HeaderbildODWCiscoMeraki2400x8001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Headerbild_ODW_CiscoMeraki_600x303-1.jpg</image:loc><image:caption>HeaderbildODWCiscoMeraki600x3031</image:caption><image:title>HeaderbildODWCiscoMeraki600x3031</image:title></image:image><lastmod>2022-05-24</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-updates-f%C3%BCr-kritische-l%C3%BCcken-in-hyper-v-und-exchange</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2021-02-05</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/open-source-effizienz-wie-deepseek-die-ki-welt-in-aufruhr-versetzt</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_DeepSeek_2400x600.jpg</image:loc><image:caption>BlogDeepSeek2400x600</image:caption><image:title>BlogDeepSeek2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_DeepSeek_600x303.jpg</image:loc><image:caption>BlogDeepSeek600x303</image:caption><image:title>BlogDeepSeek600x303</image:title></image:image><lastmod>2025-02-13</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/m365-copilot-was-k%C3%B6nnen-wir-erwarten</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/H%C3%BCseyin-Basyildiz-300x300.jpg</image:loc><image:caption>HüseyinBasyildiz300x300</image:caption><image:title>HüseyinBasyildiz300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-CoPilot-Serie_Huseyin_600x303-2.jpg</image:loc><image:caption>MicrosoftCoPilotSerieHuseyin600x3032</image:caption><image:title>MicrosoftCoPilotSerieHuseyin600x3032</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-CoPilot-Serie_Huseyin_2400x800-2.jpg</image:loc><image:caption>MicrosoftCoPilotSerieHuseyin2400x8002</image:caption><image:title>MicrosoftCoPilotSerieHuseyin2400x8002</image:title></image:image><lastmod>2023-11-23</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/gravierende-schwachstelle-intel-amt</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Gravierende-Schwachstelle_1440x400.jpg</image:loc><image:caption>BLGravierendeSchwachstelle1440x400</image:caption><image:title>BLGravierendeSchwachstelle1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Gravierende-Schwachstelle_1440x400-2.jpg</image:loc><image:caption>BLGravierendeSchwachstelle1440x4002</image:caption><image:title>BLGravierendeSchwachstelle1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/in-diesen-situationen-sind-chatbots-heute-unschlagbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_5%20unschlagbare%20Chatbots/Chatbot_4.jpg</image:loc><image:caption>Chatbot4</image:caption><image:title>Chatbot4</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Chatbot_1440x400.jpg</image:loc><image:caption>Chatbot1440x400</image:caption><image:title>Chatbot1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_5%20unschlagbare%20Chatbots/Chatbot_2_Twitter.jpg</image:loc><image:caption>Chatbot2Twitter</image:caption><image:title>Chatbot2Twitter</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_5%20unschlagbare%20Chatbots/Chatbot_3.jpg</image:loc><image:caption>Chatbot3</image:caption><image:title>Chatbot3</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Chatbot_1440x400-2.jpg</image:loc><image:caption>Chatbot1440x4002</image:caption><image:title>Chatbot1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Bild%20Philip.jpg</image:loc><image:caption>BildPhilip</image:caption><image:title>BildPhilip</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_5%20unschlagbare%20Chatbots/Chatbot_5_Rapporting.jpg</image:loc><image:caption>Chatbot5Rapporting</image:caption><image:title>Chatbot5Rapporting</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_5%20unschlagbare%20Chatbots/Chatbot_1.jpg</image:loc><image:caption>Chatbot1</image:caption><image:title>Chatbot1</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/einf%C3%BChrung-in-cloud-managed-wireless</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/E-Mail%20Vorlage/Button_jetztregistrieren_dunkeltuerkis.png</image:loc><image:caption>Buttonjetztregistrierendunkeltuerkis</image:caption><image:title>Buttonjetztregistrierendunkeltuerkis</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco%20Header_V2.jpg</image:loc><image:caption>CiscoHeaderV2</image:caption><image:title>CiscoHeaderV2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Meraki_Wireless_600x303.jpg</image:loc><image:caption>CiscoMerakiWireless600x303</image:caption><image:title>CiscoMerakiWireless600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/E-Mail%20Vorlage/Button_Weiterlesen_dunkeltuerkis-1.png</image:loc><image:caption>ButtonWeiterlesendunkeltuerkis1</image:caption><image:title>ButtonWeiterlesendunkeltuerkis1</image:title></image:image><lastmod>2021-05-25</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/wichtiges-update-zu-kritische-schwachstellen-in-microsoft-exchange</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2021-03-09</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/man-in-the-e-mail-attack</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Email_Kontakte_kompromittieren.png</image:loc><image:caption>EmailKontaktekompromittieren</image:caption><image:title>EmailKontaktekompromittieren</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Headerbild_LP_ManintheEmailAttacken.jpg</image:loc><image:caption>HeaderbildLPManintheEmailAttacken</image:caption><image:title>HeaderbildLPManintheEmailAttacken</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/EmailHeader_Man%20in%20the%20EmailAttacken.jpg</image:loc><image:caption>EmailHeaderManintheEmailAttacken</image:caption><image:title>EmailHeaderManintheEmailAttacken</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft_Azure_1.png</image:loc><image:caption>MicrosoftAzure1</image:caption><image:title>MicrosoftAzure1</image:title></image:image><lastmod>2019-10-30</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/zukunftsbest%C3%A4ndige-it-infrastruktur-transparent-und-nachvollziehbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/EC_Blog2_IT-Support-als-Br%C3%BCckenbauer_Bombelka_2400x800.jpg</image:loc><image:caption>ECBlog2ITSupportalsBrückenbauerBombelka2400x800</image:caption><image:title>ECBlog2ITSupportalsBrückenbauerBombelka2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/EC_Blog2_IT-Support-als-Br%C3%BCckenbauer_Bombelka_600x303.jpg</image:loc><image:caption>ECBlog2ITSupportalsBrückenbauerBombelka600x303</image:caption><image:title>ECBlog2ITSupportalsBrückenbauerBombelka600x303</image:title></image:image><lastmod>2024-05-23</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/gef%C3%A4hrliche-l%C3%BCcken-bedrohen-citrix-adc-gateway-und-sd-wan</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Claudio_Addario.jpg</image:loc><image:caption>ClaudioAddario</image:caption><image:title>ClaudioAddario</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2020-10-09</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-microsoft-printnightmare-versch%C3%A4rft-sich-erneut</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-08-16</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-sicherheitsl%C3%BCcke-vmware-vcenter-server</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Claudio_Addario.jpg</image:loc><image:caption>ClaudioAddario</image:caption><image:title>ClaudioAddario</image:title></image:image><lastmod>2020-04-21</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstellen-im-sslvpn-portal-von-fortigate</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Autorenprofil_H%C3%A4nggi_Patrik.jpg</image:loc><image:caption>AutorenprofilHänggiPatrik</image:caption><image:title>AutorenprofilHänggiPatrik</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/was-wir-von-start-ups-lernen-k%C3%B6nnen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_DT_StartUps_lernen_1440x400.jpg</image:loc><image:caption>BLDTStartUpslernen1440x400</image:caption><image:title>BLDTStartUpslernen1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_DT_StartUps_lernen_1440x400-2.jpg</image:loc><image:caption>BLDTStartUpslernen1440x4002</image:caption><image:title>BLDTStartUpslernen1440x4002</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsl%C3%BCcken-in-citrix-netscaler</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2023-10-10</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/exchange-online-mit-oder-ohne-management-server</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Stefan-Thoma_300x300.jpg</image:loc><image:caption>StefanThoma300x300</image:caption><image:title>StefanThoma300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Exchange-Online_600x303px.jpg</image:loc><image:caption>ExchangeOnline600x303px</image:caption><image:title>ExchangeOnline600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Exchange-Online_2400x800px.jpg</image:loc><image:caption>ExchangeOnline2400x800px</image:caption><image:title>ExchangeOnline2400x800px</image:title></image:image><lastmod>2022-11-17</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/ignite-2017-neuigkeiten</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild-Microsoft_1440x400-3.jpg</image:loc><image:caption>BildMicrosoft1440x4003</image:caption><image:title>BildMicrosoft1440x4003</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild-Microsoft_1440x300_Test.jpg</image:loc><image:caption>BildMicrosoft1440x300Test</image:caption><image:title>BildMicrosoft1440x300Test</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Enterprise%20Cloud/Windows%20AutoPilot%20Deployment%20Service.jpg</image:loc><image:caption>WindowsAutoPilotDeploymentService</image:caption><image:title>WindowsAutoPilotDeploymentService</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Enterprise%20Cloud/Microsoft%20Intune.jpg</image:loc><image:caption>MicrosoftIntune</image:caption><image:title>MicrosoftIntune</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/so-planen-sie-eine-gnadenlose-phishing-attacke</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header_Phishing_Attacken_3_2400x600_FES-grau.jpg</image:loc><image:caption>HeaderPhishingAttacken32400x600FESgrau</image:caption><image:title>HeaderPhishingAttacken32400x600FESgrau</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header_Phishing_Attacken_3_260x260.jpg</image:loc><image:caption>HeaderPhishingAttacken3260x260</image:caption><image:title>HeaderPhishingAttacken3260x260</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/conditional-access-f%C3%BCr-active-directory</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Silvan-Buehler_300x300.jpg</image:loc><image:caption>SilvanBuehler300x300</image:caption><image:title>SilvanBuehler300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BiRDP-Verbindung.png</image:loc><image:caption>BiRDPVerbindung</image:caption><image:title>BiRDPVerbindung</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Silverfort_600x303-1.jpg</image:loc><image:caption>BlogSilverfort600x3031</image:caption><image:title>BlogSilverfort600x3031</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Silverfort_2400x600.jpg</image:loc><image:caption>BlogSilverfort2400x600</image:caption><image:title>BlogSilverfort2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Funktionsweise.png</image:loc><image:caption>Funktionsweise</image:caption><image:title>Funktionsweise</image:title></image:image><lastmod>2025-02-20</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/google-chrome-misstraut-ssl-zertifikaten-von-symantec</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/distrust1.png</image:loc><image:caption>distrust1</image:caption><image:title>distrust1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/SSL_Zertifikate_Symatec/Bild_Text-2.jpg</image:loc><image:caption>BildText2</image:caption><image:title>BildText2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Patrik-Schumacher.jpg</image:loc><image:caption>PatrikSchumacher</image:caption><image:title>PatrikSchumacher</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/SSL_Zertifikate_Symatec/Bild_Text-1.jpg</image:loc><image:caption>BildText1</image:caption><image:title>BildText1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/181231_Headerbilder/BL_Google-misstraut-SLL_1440x400.jpg</image:loc><image:caption>BLGooglemisstrautSLL1440x400</image:caption><image:title>BLGooglemisstrautSLL1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Google-misstraut-SLL_1440x400-1.jpg</image:loc><image:caption>BLGooglemisstrautSLL1440x4001</image:caption><image:title>BLGooglemisstrautSLL1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/SSL_Zertifikate_Symatec/SSL_Zertifikat_V1.jpg</image:loc><image:caption>SSLZertifikatV1</image:caption><image:title>SSLZertifikatV1</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/eine-bessere-m%C3%B6glichkeit-ihr-netzwerk-zu-steuern</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Netzwerk_Blogbericht_1440x400-1.jpg</image:loc><image:caption>NetzwerkBlogbericht1440x4001</image:caption><image:title>NetzwerkBlogbericht1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Neztwerksteuerung_1440x400-1.jpg</image:loc><image:caption>BLNeztwerksteuerung1440x4001</image:caption><image:title>BLNeztwerksteuerung1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Autorenprofil_H%C3%A4nggi_Patrik.jpg</image:loc><image:caption>AutorenprofilHänggiPatrik</image:caption><image:title>AutorenprofilHänggiPatrik</image:title></image:image><lastmod>2019-05-21</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/4-welt-der-token-ai-llms-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Feb-12-2024-11-04-30-4571-AM.png</image:loc><image:caption>grafikpngFeb1220241104304571AM</image:caption><image:title>grafikpngFeb1220241104304571AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/AI_Blogserie_SWT_3-600x303.jpg</image:loc><image:caption>AIBlogserieSWT3600x303</image:caption><image:title>AIBlogserieSWT3600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/AI_Blogserie_SWT_4-2400x800.jpg</image:loc><image:caption>AIBlogserieSWT42400x800</image:caption><image:title>AIBlogserieSWT42400x800</image:title></image:image><lastmod>2024-02-22</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/hybrid-das-neue-normal</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Webex_700Pixel.jpg</image:loc><image:caption>CiscoWebex700Pixel</image:caption><image:title>CiscoWebex700Pixel</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Sabine-Feer_320x320.jpg</image:loc><image:caption>SabineFeer320x320</image:caption><image:title>SabineFeer320x320</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco-Webex_600x303-2.jpg</image:loc><image:caption>CiscoWebex600x3032</image:caption><image:title>CiscoWebex600x3032</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco-Webex_2400x800.jpg</image:loc><image:caption>CiscoWebex2400x800</image:caption><image:title>CiscoWebex2400x800</image:title></image:image><lastmod>2022-03-15</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/zehn-gr%C3%BCnde-f%C3%BCr-dsgvo-konformes-datenmanagement</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_10Gruende_DSGVO.jpg</image:loc><image:caption>BL10GruendeDSGVO</image:caption><image:title>BL10GruendeDSGVO</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cramer_Marco.jpg</image:loc><image:caption>CramerMarco</image:caption><image:title>CramerMarco</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_10Gruende_DSGVO-1.jpg</image:loc><image:caption>BL10GruendeDSGVO1</image:caption><image:title>BL10GruendeDSGVO1</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitspatch-gegen-kritische-smbv3-l%C3%BCcke</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2020-03-18</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/1-grundlagen-ai-llms-entmystifiziert-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/AI-Serie_SWT_Grundlagen-1_Mensch-AI_600x303.jpg</image:loc><image:caption>AISerieSWTGrundlagen1MenschAI600x303</image:caption><image:title>AISerieSWTGrundlagen1MenschAI600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png.png</image:loc><image:caption>grafikpng</image:caption><image:title>grafikpng</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/AI-Serie_SWT_Grundlagen-1_Mensch-AI.jpg</image:loc><image:caption>AISerieSWTGrundlagen1MenschAI</image:caption><image:title>AISerieSWTGrundlagen1MenschAI</image:title></image:image><lastmod>2024-02-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-sicherheitsl%C3%BCcken-in-hp-drucker-modellen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_2400x600px-1.jpg</image:loc><image:caption>BlogSecScorecard2400x600px1</image:caption><image:title>BlogSecScorecard2400x600px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2022-03-24</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/entscheiden-sie-sich-f%C3%BCr-die-sichere-cloud</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Datacenter%20Webinar.jpg</image:loc><image:caption>DatacenterWebinar</image:caption><image:title>DatacenterWebinar</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/OnDemand-Webinar_David_Datacenter_2400x600.jpg</image:loc><image:caption>OnDemandWebinarDavidDatacenter2400x600</image:caption><image:title>OnDemandWebinarDavidDatacenter2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><lastmod>2020-06-04</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/cybersecurity-risikomanagement-mit-dem-bithawk-framework</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Cybersecurity-Risikomanagement_2400x600.jpg</image:loc><image:caption>BlogCybersecurityRisikomanagement2400x600</image:caption><image:title>BlogCybersecurityRisikomanagement2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Cybersecurity-Risikomanagement_600x303.jpg</image:loc><image:caption>BlogCybersecurityRisikomanagement600x303</image:caption><image:title>BlogCybersecurityRisikomanagement600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/%C3%9Cberwachung%C3%9Cberpr%C3%BCfung.png</image:loc><image:caption>ÜberwachungÜberprüfung</image:caption><image:title>ÜberwachungÜberprüfung</image:title></image:image><lastmod>2024-12-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsl%C3%BCcken-bei-iot-ger%C3%A4te</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus%20Arnold.jpg</image:loc><image:caption>MarkusArnold</image:caption><image:title>MarkusArnold</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><lastmod>2020-07-17</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsl%C3%BCcken-in-hpe-oneview</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2023-09-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schneller-und-schicker-windows-11-steht-vor-der-t%C3%BCr</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Windows%2011_600x303px.jpg</image:loc><image:caption>Windows11600x303px</image:caption><image:title>Windows11600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Windows%2011_2400x800px-1.jpg</image:loc><image:caption>Windows112400x800px1</image:caption><image:title>Windows112400x800px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Windows%20as%20a%20Service.jpg</image:loc><image:caption>WindowsasaService</image:caption><image:title>WindowsasaService</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Windows_11_590_263.jpg</image:loc><image:caption>Windows11590263</image:caption><image:title>Windows11590263</image:title></image:image><lastmod>2021-09-07</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/support-ende-windows-server-2012</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Server-2012_2400x600.jpg</image:loc><image:caption>MicrosoftServer20122400x600</image:caption><image:title>MicrosoftServer20122400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Stefan%20Ottiger%20Autor.jpg</image:loc><image:caption>StefanOttigerAutor</image:caption><image:title>StefanOttigerAutor</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Server-2012_600x303.jpg</image:loc><image:caption>MicrosoftServer2012600x303</image:caption><image:title>MicrosoftServer2012600x303</image:title></image:image><lastmod>2023-03-16</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/neue-0-day-schwachstelle-bedroht-exchange-server</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-11-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsluecke-in-cisco-produkten</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2023-10-17</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/asr-regeln-sch%C3%BCtzen-sie-endpunkte-mit-attack-surface-reduction-rules</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Grafik-Einf%C3%BChrung_ASR.jpg</image:loc><image:caption>GrafikEinführungASR</image:caption><image:title>GrafikEinführungASR</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_allgemein_600x303px.jpg</image:loc><image:caption>WebinarSecurityallgemein600x303px</image:caption><image:title>WebinarSecurityallgemein600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Patrik-Schumacher.jpg</image:loc><image:caption>PatrikSchumacher</image:caption><image:title>PatrikSchumacher</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_Microsoft-Defender_2400x800px.jpg</image:loc><image:caption>WebinarSecurityMicrosoftDefender2400x800px</image:caption><image:title>WebinarSecurityMicrosoftDefender2400x800px</image:title></image:image><lastmod>2023-10-19</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/azure-mfa-der-mehrfachschutz-f%C3%BCr-ihre-accounts</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/OnDemandVideo_MFA_SilvanB%C3%BChler_2400x800px-2.jpg</image:loc><image:caption>OnDemandVideoMFASilvanBühler2400x800px2</image:caption><image:title>OnDemandVideoMFASilvanBühler2400x800px2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/OnDemandVideo_MFA_SilvanB%C3%BChler_690x263px.jpg</image:loc><image:caption>OnDemandVideoMFASilvanBühler690x263px</image:caption><image:title>OnDemandVideoMFASilvanBühler690x263px</image:title></image:image><lastmod>2020-05-26</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/copilot-f%C3%BCr-m365-erfahrungen-und-mehrwerte</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/H%C3%BCseyin-Basyildiz-300x300.jpg</image:loc><image:caption>HüseyinBasyildiz300x300</image:caption><image:title>HüseyinBasyildiz300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-CoPilot-Serie_Eugen_600x303.jpg</image:loc><image:caption>MicrosoftCoPilotSerieEugen600x303</image:caption><image:title>MicrosoftCoPilotSerieEugen600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-CoPilot-Serie_Eugen_2400x800.jpg</image:loc><image:caption>MicrosoftCoPilotSerieEugen2400x800</image:caption><image:title>MicrosoftCoPilotSerieEugen2400x800</image:title></image:image><lastmod>2024-02-13</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-%C3%A4ndert-die-default-security-settings</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2020-02-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-microsoft-exchange-server-2016-2019-cve-2024-21410</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2024-02-15</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BitHawk_November2018%20Theme/Images/MG_5711-v2__FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd.jpg</image:loc><image:caption>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:caption><image:title>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_SWT_AI2_600x303.jpg</image:loc><image:caption>BlogSWTAI2600x303</image:caption><image:title>BlogSWTAI2600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/9-LLMHumanoidRobots_600x303.jpg</image:loc><image:caption>9LLMHumanoidRobots600x303</image:caption><image:title>9LLMHumanoidRobots600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Entlastung-im-Berufsalltag-durch-AI_600x303.jpg</image:loc><image:caption>EntlastungimBerufsalltagdurchAI600x303</image:caption><image:title>EntlastungimBerufsalltagdurchAI600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_100Tage_Copilot_600x303-1.jpg</image:loc><image:caption>Blog100TageCopilot600x3031</image:caption><image:title>Blog100TageCopilot600x3031</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_ZusammenarbeitmitAgents_600x303.jpg</image:loc><image:caption>BlogZusammenarbeitmitAgents600x303</image:caption><image:title>BlogZusammenarbeitmitAgents600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/CopilotNotebooks_DatenflutinWissenverwandeln_600x303-1.jpg</image:loc><image:caption>CopilotNotebooksDatenflutinWissenverwandeln600x3031</image:caption><image:title>CopilotNotebooksDatenflutinWissenverwandeln600x3031</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_DeepSeek_600x303.jpg</image:loc><image:caption>BlogDeepSeek600x303</image:caption><image:title>BlogDeepSeek600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/EU-KI-Verordnung-600x303.jpg</image:loc><image:caption>EUKIVerordnung600x303</image:caption><image:title>EUKIVerordnung600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/10_Revolution%20der%20Large%20Action%20Models_690x263-2.jpg</image:loc><image:caption>10RevolutionderLargeActionModels690x2632</image:caption><image:title>10RevolutionderLargeActionModels690x2632</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Mensch-AI-Interaktion_600x303.jpg</image:loc><image:caption>BlogMenschAIInteraktion600x303</image:caption><image:title>BlogMenschAIInteraktion600x303</image:title></image:image><lastmod>2023-12-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/windows-l%C3%BCcke-in-remote-desktop-services</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/support-aus-profihand-der-erfolg-in-sachen-sap-service-management</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_B-rigthsource_600x303px.jpg</image:loc><image:caption>SecurityBrigthsource600x303px</image:caption><image:title>SecurityBrigthsource600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Lars_Olb%C3%B6ter.jpg</image:loc><image:caption>LarsOlböter</image:caption><image:title>LarsOlböter</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_B-rigthsource_2400x800px.jpg</image:loc><image:caption>SecurityBrigthsource2400x800px</image:caption><image:title>SecurityBrigthsource2400x800px</image:title></image:image><lastmod>2021-03-04</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-bei-microsoft-exchange</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2019-01-31</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/wie-das-netzwerk-das-business-beschleunigt</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Autorenprofil_H%C3%A4nggi_Patrik.jpg</image:loc><image:caption>AutorenprofilHänggiPatrik</image:caption><image:title>AutorenprofilHänggiPatrik</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/DNA-Blog_Header_2400x800px.jpg</image:loc><image:caption>DNABlogHeader2400x800px</image:caption><image:title>DNABlogHeader2400x800px</image:title></image:image><lastmod>2019-11-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsluecke-in-vcenter-cve-2024-38812</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2024-10-25</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/zero-day-schwachstelle-in-jscript-scripting-engine</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2020-01-23</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/einf%C3%BChrung-kollaboration-part-3</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bl%C3%A4ttler%20Remo%20320x320.jpg</image:loc><image:caption>BlättlerRemo320x320</image:caption><image:title>BlättlerRemo320x320</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header_Kollaborationsloesung-PartIII_2400x600px.jpg</image:loc><image:caption>HeaderKollaborationsloesungPartIII2400x600px</image:caption><image:title>HeaderKollaborationsloesungPartIII2400x600px</image:title></image:image><lastmod>2019-10-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/vmware-informiert-%C3%BCber-kritische-schwachstellen-cve-2025-22224-cve-2025-22225-cve-2025-22226</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/haben-sie-eine-erfolgreiche-cloud-strategie</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Feature_Podcast_600x303.png</image:loc><image:caption>FeaturePodcast600x303</image:caption><image:title>FeaturePodcast600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cloud-Swisshaus_Podcast_2400x800px.jpg</image:loc><image:caption>CloudSwisshausPodcast2400x800px</image:caption><image:title>CloudSwisshausPodcast2400x800px</image:title></image:image><lastmod>2020-10-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/lets-encrypt</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Let.jpg</image:loc><image:caption>HeaderLet</image:caption><image:title>HeaderLet</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><lastmod>2023-03-07</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/weshalb-die-ckw-den-weg-in-die-cloud-w%C3%A4hlt</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Statement_CKW_BH-1024px.jpg</image:loc><image:caption>StatementCKWBH1024px</image:caption><image:title>StatementCKWBH1024px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_CKW_Weg_Cloud_1440x400.jpg</image:loc><image:caption>BLCKWWegCloud1440x400</image:caption><image:title>BLCKWWegCloud1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Azure_740x220.jpg</image:loc><image:caption>Azure740x220</image:caption><image:title>Azure740x220</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Pirmin_Felber_305B7546.jpg</image:loc><image:caption>PirminFelber305B7546</image:caption><image:title>PirminFelber305B7546</image:title></image:image><lastmod>2019-03-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-sicherheitsl%C3%BCcke-im-vmware-hypervisor-esxi-und-vcenter</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel_Stadelmann.jpg</image:loc><image:caption>DanielStadelmann</image:caption><image:title>DanielStadelmann</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px.jpg</image:loc><image:caption>SecurityStandart600x303px</image:caption><image:title>SecurityStandart600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-03-02</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/vmware-cloud-sddc-der-einfachste-weg-f%C3%BCr-ihre-workloads-in-die-cloud</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/WMWare_2400x800px.jpg</image:loc><image:caption>WMWare2400x800px</image:caption><image:title>WMWare2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild_1_Blog%20Dani%20Stadelmann-1.jpg</image:loc><image:caption>Bild1BlogDaniStadelmann1</image:caption><image:title>Bild1BlogDaniStadelmann1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild_2_Blog%20Dani%20Stadelmann.jpg</image:loc><image:caption>Bild2BlogDaniStadelmann</image:caption><image:title>Bild2BlogDaniStadelmann</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel_Stadelmann.jpg</image:loc><image:caption>DanielStadelmann</image:caption><image:title>DanielStadelmann</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/WMWare_600x303px.jpg</image:loc><image:caption>WMWare600x303px</image:caption><image:title>WMWare600x303px</image:title></image:image><lastmod>2021-08-24</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/5-mit-w%C3%B6rtern-rechnen-ai-llms-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-5_Mit-W%C3%B6rter-rechnen_600x300.jpg</image:loc><image:caption>Blog5MitWörterrechnen600x300</image:caption><image:title>Blog5MitWörterrechnen600x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-5_Mit-W%C3%B6rter-rechnen_2400x800.jpg</image:loc><image:caption>Blog5MitWörterrechnen2400x800</image:caption><image:title>Blog5MitWörterrechnen2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-11-44-22-0912-AM.png</image:loc><image:caption>grafikpngJan3020241144220912AM</image:caption><image:title>grafikpngJan3020241144220912AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-11-42-27-8252-AM.png</image:loc><image:caption>grafikpngJan3020241142278252AM</image:caption><image:title>grafikpngJan3020241142278252AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-11-43-42-7241-AM.png</image:loc><image:caption>grafikpngJan3020241143427241AM</image:caption><image:title>grafikpngJan3020241143427241AM</image:title></image:image><lastmod>2024-02-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/iphones-durch-zero-day-l%C3%BCcken-in-apple-mail-angreifbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2020-04-24</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-defender</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_MicrosoftSecurityPortfolio_600x303px-2.jpg</image:loc><image:caption>WebinarSecurityMicrosoftSecurityPortfolio600x303px2</image:caption><image:title>WebinarSecurityMicrosoftSecurityPortfolio600x303px2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_MicrosoftSecurityPortfolio_2400x800px-2.jpg</image:loc><image:caption>WebinarSecurityMicrosoftSecurityPortfolio2400x800px2</image:caption><image:title>WebinarSecurityMicrosoftSecurityPortfolio2400x800px2</image:title></image:image><lastmod>2021-02-02</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/einf%C3%BChrung-kollaboration-part-2</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bl%C3%A4ttler%20Remo%20320x320.jpg</image:loc><image:caption>BlättlerRemo320x320</image:caption><image:title>BlättlerRemo320x320</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header_Kollaborationsloesung-PartII_2400x600px-1-1.jpg</image:loc><image:caption>HeaderKollaborationsloesungPartII2400x600px11</image:caption><image:title>HeaderKollaborationsloesungPartII2400x600px11</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header_Kollaborationsloesung-PartII_2400x600px-1-2.jpg</image:loc><image:caption>HeaderKollaborationsloesungPartII2400x600px12</image:caption><image:title>HeaderKollaborationsloesungPartII2400x600px12</image:title></image:image><lastmod>2019-10-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/fortios_cve-2024-21762-und-cve-2024-23113</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2024-02-09</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/mensch-ai-interaktion-drahtseitakt-glauben-vs.-halluzinationen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Mensch-AI-Interaktion_600x303.jpg</image:loc><image:caption>BlogMenschAIInteraktion600x303</image:caption><image:title>BlogMenschAIInteraktion600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Statistik_Google-1.png</image:loc><image:caption>StatistikGoogle1</image:caption><image:title>StatistikGoogle1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Mensch-AI-Interaktion_2400x600.jpg</image:loc><image:caption>BlogMenschAIInteraktion2400x600</image:caption><image:title>BlogMenschAIInteraktion2400x600</image:title></image:image><lastmod>2024-07-15</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/was-haben-cisco-dna-assurance-und-ein-cham%C3%A4leon-gemeinsam</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_DNA_Assurance_Grafik3.1.jpg</image:loc><image:caption>CiscoDNAAssuranceGrafik31</image:caption><image:title>CiscoDNAAssuranceGrafik31</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Cisco_DNA_Assurace_2400x600.jpg</image:loc><image:caption>SecurityCiscoDNAAssurace2400x600</image:caption><image:title>SecurityCiscoDNAAssurace2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Autorenprofil_H%C3%A4nggi_Patrik.jpg</image:loc><image:caption>AutorenprofilHänggiPatrik</image:caption><image:title>AutorenprofilHänggiPatrik</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_DNA_Assurance_Grafik2.jpg</image:loc><image:caption>CiscoDNAAssuranceGrafik2</image:caption><image:title>CiscoDNAAssuranceGrafik2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_DNA_Assurance_Grafik1.jpg</image:loc><image:caption>CiscoDNAAssuranceGrafik1</image:caption><image:title>CiscoDNAAssuranceGrafik1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_DNA_Assurance_Grafik4.jpg</image:loc><image:caption>CiscoDNAAssuranceGrafik4</image:caption><image:title>CiscoDNAAssuranceGrafik4</image:title></image:image><lastmod>2020-07-08</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-in-microsoft-office-cve-2023-36884</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><lastmod>2023-07-14</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/die-covid-19-welle-erfolgreich-meistern-sechs-denkanst%C3%B6sse</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Covid19_Bericht_Terry_2400x800px.jpg</image:loc><image:caption>Covid19BerichtTerry2400x800px</image:caption><image:title>Covid19BerichtTerry2400x800px</image:title></image:image><lastmod>2020-05-28</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-remotedesktop-schwachstelle-cve-2025-50171-cvss-9.1</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus-Schober_300x300.jpg</image:loc><image:caption>MarkusSchober300x300</image:caption><image:title>MarkusSchober300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2025-08-19</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/einmaleins-f%C3%BCr-single-sign-on</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Single_signOn_1440x400-1.jpg</image:loc><image:caption>BLSinglesignOn1440x4001</image:caption><image:title>BLSinglesignOn1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Pirmin_Felber_305B7546.jpg</image:loc><image:caption>PirminFelber305B7546</image:caption><image:title>PirminFelber305B7546</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Single_signOn_1440x400.jpg</image:loc><image:caption>BLSinglesignOn1440x400</image:caption><image:title>BLSinglesignOn1440x400</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstellen-in-veeam-updates-verf%C3%BCgbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><lastmod>2024-09-05</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/2-ai-renaissance-ai-llms-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-1.png</image:loc><image:caption>grafikpng1</image:caption><image:title>grafikpng1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/AI-Serie_SWT_Grundlagen-1_Mensch-AI.jpg</image:loc><image:caption>AISerieSWTGrundlagen1MenschAI</image:caption><image:title>AISerieSWTGrundlagen1MenschAI</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/AI-Serie_SWT_Grundlagen-1_Mensch-AI_600x303.jpg</image:loc><image:caption>AISerieSWTGrundlagen1MenschAI600x303</image:caption><image:title>AISerieSWTGrundlagen1MenschAI600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-2.png</image:loc><image:caption>grafikpng2</image:caption><image:title>grafikpng2</image:title></image:image><lastmod>2024-02-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/citrix-schliesst-sicherheitsl%C3%BCcke-in-workspaceapp-f%C3%BCr-windows-0</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2021-05-27</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/microsoft-365-teams-governance-ein-leitfaden-f%C3%BCr-unternehmen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Michael-Lichtsteiner300x300.jpg</image:loc><image:caption>MichaelLichtsteiner300x300</image:caption><image:title>MichaelLichtsteiner300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_M365-TeamsGovernance_600x303.jpg</image:loc><image:caption>BlogM365TeamsGovernance600x303</image:caption><image:title>BlogM365TeamsGovernance600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_M365-TeamsGovernance_2400x600.jpg</image:loc><image:caption>BlogM365TeamsGovernance2400x600</image:caption><image:title>BlogM365TeamsGovernance2400x600</image:title></image:image><lastmod>2024-10-10</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/post-quantum-kryptographie-die-zukunft-der-datensicherheit</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BLOG_Quantum-Kryptographie-Terry_600x303.jpg</image:loc><image:caption>BLOGQuantumKryptographieTerry600x303</image:caption><image:title>BLOGQuantumKryptographieTerry600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BLOG_Quantum-Kryptographie-Terry_2400x600.jpg</image:loc><image:caption>BLOGQuantumKryptographieTerry2400x600</image:caption><image:title>BLOGQuantumKryptographieTerry2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><lastmod>2024-07-01</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/bei-microsoft-365-geht-es-um-mehr-als-technologie</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/H%C3%BCseyin-Basyildiz-300x300.jpg</image:loc><image:caption>HüseyinBasyildiz300x300</image:caption><image:title>HüseyinBasyildiz300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/M365-Blog_2400x800.jpg</image:loc><image:caption>M365Blog2400x800</image:caption><image:title>M365Blog2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/M365-Blog_600x303.jpg</image:loc><image:caption>M365Blog600x303</image:caption><image:title>M365Blog600x303</image:title></image:image><lastmod>2022-09-15</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/tipps-und-gegenmassnahme-ransomware-petya</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Tipps-gegen-Ransomware_1440x400.jpg</image:loc><image:caption>BLTippsgegenRansomware1440x400</image:caption><image:title>BLTippsgegenRansomware1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Tipps-gegen-Ransomware_1440x400-2.jpg</image:loc><image:caption>BLTippsgegenRansomware1440x4002</image:caption><image:title>BLTippsgegenRansomware1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/6-rag-modelle-ai-llms-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_SWT_AI1_600x303.jpg</image:loc><image:caption>BlogSWTAI1600x303</image:caption><image:title>BlogSWTAI1600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-11-53-14-3676-AM.png</image:loc><image:caption>grafikpngJan3020241153143676AM</image:caption><image:title>grafikpngJan3020241153143676AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_SWT_AI1_2400x800.jpg</image:loc><image:caption>BlogSWTAI12400x800</image:caption><image:title>BlogSWTAI12400x800</image:title></image:image><lastmod>2024-02-27</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-tls-ssl-cisco-asa</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2019-07-15</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/m365-copilot-reibungslose-einf%C3%BChrung-mit-struktur</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-CoPilot-Serie_Eugen_2400x800.jpg</image:loc><image:caption>MicrosoftCoPilotSerieEugen2400x800</image:caption><image:title>MicrosoftCoPilotSerieEugen2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-CoPilot-Serie_Eugen_600x303.jpg</image:loc><image:caption>MicrosoftCoPilotSerieEugen600x303</image:caption><image:title>MicrosoftCoPilotSerieEugen600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Eugen-Spuling_300x300ps.jpg</image:loc><image:caption>EugenSpuling300x300ps</image:caption><image:title>EugenSpuling300x300ps</image:title></image:image><lastmod>2023-12-05</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/windows-hello-for-business-das-neue-passwort-einfach-und-sicher</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Pirmin_Felber_305B7546.jpg</image:loc><image:caption>PirminFelber305B7546</image:caption><image:title>PirminFelber305B7546</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Hello-for-Business-_1440x400-1.jpg</image:loc><image:caption>HelloforBusiness1440x4001</image:caption><image:title>HelloforBusiness1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Hello-for-Business-_1440x400.jpg</image:loc><image:caption>HelloforBusiness1440x400</image:caption><image:title>HelloforBusiness1440x400</image:title></image:image><lastmod>2019-01-29</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/bei-ewo-hat-hpe-nimble-storage-alle-erwartungen-erf%C3%BCllt</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/EWO_Versorgungssicherheit_2400x600-1.jpg</image:loc><image:caption>EWOVersorgungssicherheit2400x6001</image:caption><image:title>EWOVersorgungssicherheit2400x6001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Andreas-Corradini.jpg</image:loc><image:caption>AndreasCorradini</image:caption><image:title>AndreasCorradini</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/EWO_Versorgungssicherheit_2400x600.jpg</image:loc><image:caption>EWOVersorgungssicherheit2400x600</image:caption><image:title>EWOVersorgungssicherheit2400x600</image:title></image:image><lastmod>2019-04-16</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/3-welt-der-parameter-ai-llms-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/AI_Blogserie_SWT_Frau_600x303.jpg</image:loc><image:caption>AIBlogserieSWTFrau600x303</image:caption><image:title>AIBlogserieSWTFrau600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-3.png</image:loc><image:caption>grafikpng3</image:caption><image:title>grafikpng3</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-11-24-52-2322-AM.png</image:loc><image:caption>grafikpngJan3020241124522322AM</image:caption><image:title>grafikpngJan3020241124522322AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/AI_Blogserie_SWT_Frau_2-2400x800.jpg</image:loc><image:caption>AIBlogserieSWTFrau22400x800</image:caption><image:title>AIBlogserieSWTFrau22400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-4.png</image:loc><image:caption>grafikpng4</image:caption><image:title>grafikpng4</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-11-25-03-4244-AM.png</image:loc><image:caption>grafikpngJan3020241125034244AM</image:caption><image:title>grafikpngJan3020241125034244AM</image:title></image:image><lastmod>2024-02-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schutz-vor-hackerangriffen-die-dunkle-seite-des-internets</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Patrick_Brielmayer.jpg</image:loc><image:caption>PatrickBrielmayer</image:caption><image:title>PatrickBrielmayer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Matineebild-Hacker_012017-schmal_1440x400jpg.jpg</image:loc><image:caption>MatineebildHacker012017schmal1440x400jpg</image:caption><image:title>MatineebildHacker012017schmal1440x400jpg</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Matineebild-Hacker_012017-schmal_1440x400jpg-1.jpg</image:loc><image:caption>MatineebildHacker012017schmal1440x400jpg1</image:caption><image:title>MatineebildHacker012017schmal1440x400jpg1</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstellen-in-veeam-backup-replicationcve-2026-21708</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2026-03-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-informiert-%C3%BCber-schwachstelle-printnightmare-in-windows</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px.jpg</image:loc><image:caption>SecurityStandart600x303px</image:caption><image:title>SecurityStandart600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2021-07-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/neues-datenschutzgesetz-jetzt-ist-zeit-zu-handeln</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Datenschutz_600x303.jpg</image:loc><image:caption>Datenschutz600x303</image:caption><image:title>Datenschutz600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Datenschutz_2400x600.jpg</image:loc><image:caption>Datenschutz2400x600</image:caption><image:title>Datenschutz2400x600</image:title></image:image><lastmod>2023-03-28</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/jahrzehntealter-designfehler</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Jahrzente_Designfehler_1440x400.jpg</image:loc><image:caption>BLJahrzenteDesignfehler1440x400</image:caption><image:title>BLJahrzenteDesignfehler1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Jahrzente_Designfehler_1440x400-2.jpg</image:loc><image:caption>BLJahrzenteDesignfehler1440x4002</image:caption><image:title>BLJahrzenteDesignfehler1440x4002</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sch%C3%BCtzen-sie-ihre-entra-id-notfallkonten</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Fido2_2400x600.jpg</image:loc><image:caption>BlogFido22400x600</image:caption><image:title>BlogFido22400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Stefan-Thoma_300x300.jpg</image:loc><image:caption>StefanThoma300x300</image:caption><image:title>StefanThoma300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Fido2_600x303.jpg</image:loc><image:caption>BlogFido2600x303</image:caption><image:title>BlogFido2600x303</image:title></image:image><lastmod>2025-02-17</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsl%C3%BCcke-in-hpe-servern-mit-intel-prozessoren</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus%20Arnold.jpg</image:loc><image:caption>MarkusArnold</image:caption><image:title>MarkusArnold</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_1440x600px.jpg</image:loc><image:caption>BlogSecScorecard1440x600px</image:caption><image:title>BlogSecScorecard1440x600px</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/die-richtige-entscheidung-f%C3%BCr-die-beste-kollaborationsl%C3%B6sung</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Kollaboration_PartIII_2400x600px.png</image:loc><image:caption>KollaborationPartIII2400x600px</image:caption><image:title>KollaborationPartIII2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Grafik-Blog-Phishing-Attacken_690px.jpg</image:loc><image:caption>GrafikBlogPhishingAttacken690px</image:caption><image:title>GrafikBlogPhishingAttacken690px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bl%C3%A4ttler%20Remo%20320x320.jpg</image:loc><image:caption>BlättlerRemo320x320</image:caption><image:title>BlättlerRemo320x320</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Kollaboration_PartIII_2400x600px.jpg</image:loc><image:caption>KollaborationPartIII2400x600px</image:caption><image:title>KollaborationPartIII2400x600px</image:title></image:image><lastmod>2020-02-06</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/die-besten-passswort-tools-im-test</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Fabian-N%C3%A4f.jpg</image:loc><image:caption>FabianNäf</image:caption><image:title>FabianNäf</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Password-Tools_1440x400-1.jpg</image:loc><image:caption>BLPasswordTools1440x4001</image:caption><image:title>BLPasswordTools1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Password-Tools_1440x400.jpg</image:loc><image:caption>BLPasswordTools1440x400</image:caption><image:title>BLPasswordTools1440x400</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/modernes-und-hybrides-arbeiten</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft_Event2400x600.jpg</image:loc><image:caption>MicrosoftEvent2400x600</image:caption><image:title>MicrosoftEvent2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft_Videosessions.jpg</image:loc><image:caption>MicrosoftVideosessions</image:caption><image:title>MicrosoftVideosessions</image:title></image:image><lastmod>2022-05-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsluecke-in-mcm-cve-2024-43468</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/zukunftsbest%C3%A4ndige-it-trends-f%C3%BCr-2025-teil-2</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/2024-12-05-19_Trends2025.jpg</image:loc><image:caption>2024120519Trends2025</image:caption><image:title>2024120519Trends2025</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild1-1.png</image:loc><image:caption>Bild11</image:caption><image:title>Bild11</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/2024-12-05-19_Trends2025.png</image:loc><image:caption>2024120519Trends2025</image:caption><image:title>2024120519Trends2025</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/java-wird-geb%C3%BChrenpflichtig</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_OpenJDK_1440x600-1-1.jpg</image:loc><image:caption>SecurityOpenJDK1440x60011</image:caption><image:title>SecurityOpenJDK1440x60011</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_OpenJDK_1440x600-1.jpg</image:loc><image:caption>SecurityOpenJDK1440x6001</image:caption><image:title>SecurityOpenJDK1440x6001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Heiri-B%C3%A4ttig.jpg</image:loc><image:caption>HeiriBättig</image:caption><image:title>HeiriBättig</image:title></image:image><lastmod>2019-02-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/exploit-code-f%C3%BCr-l%C3%BCcke-in-microsoft-sql-server-ver%C3%B6ffentlicht</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2020-02-21</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstelle-in-windows-tcp/ip</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-02-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsluecke-in-citrix-cve-2023-6549</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2024-01-16</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-in-cisco-asa-cve-2025-20333</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2025-09-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/5-faktoren-f%C3%BCr-ihre-cyber-sicherheit</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Phishing_2400x800px.jpg</image:loc><image:caption>Phishing2400x800px</image:caption><image:title>Phishing2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Phishing_600x303px.jpg</image:loc><image:caption>Phishing600x303px</image:caption><image:title>Phishing600x303px</image:title></image:image><lastmod>2021-02-01</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-sentinel-ein-tool-das-ihre-herausforderungen-meistert</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ODW_Microsoft_Sentinelbreit_600x300.jpg</image:loc><image:caption>ODWMicrosoftSentinelbreit600x300</image:caption><image:title>ODWMicrosoftSentinelbreit600x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ODW_Microsoft_Sentinelbreit_2400x600-1.jpg</image:loc><image:caption>ODWMicrosoftSentinelbreit2400x6001</image:caption><image:title>ODWMicrosoftSentinelbreit2400x6001</image:title></image:image><lastmod>2023-09-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/hardwaregest%C3%BCtzten-sicherheitsfunktionen-von-hp</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/HP%20Inc_Blog.jpg</image:loc><image:caption>HPIncBlog</image:caption><image:title>HPIncBlog</image:title></image:image><lastmod>2020-02-18</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/vmware-vcenter-server-schwachstellen-cve-2024-37079-cve-2024-37080</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/windows-as-a-service-%C3%BCberf%C3%BChrung-vom-projekt-zum-prozess</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Windows10_1440x400-1.jpg</image:loc><image:caption>BLWindows101440x4001</image:caption><image:title>BLWindows101440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Windows10_1440x400.jpg</image:loc><image:caption>BLWindows101440x400</image:caption><image:title>BLWindows101440x400</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/cisco-umbrella-die-cloud-security-gegen-bedrohungen-im-web</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Umbrella/Security-Bild_Text.jpg</image:loc><image:caption>SecurityBildText</image:caption><image:title>SecurityBildText</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco_Umbrella/Security-Bild_Email_302.jpg</image:loc><image:caption>SecurityBildEmail302</image:caption><image:title>SecurityBildEmail302</image:title></image:image><lastmod>2020-07-02</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/hp-sure-view-der-effektive-sichtschutz-am-laptop</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_HP-Sure-View_1440x400-1.jpg</image:loc><image:caption>BLHPSureView1440x4001</image:caption><image:title>BLHPSureView1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_HP-Sure-View_1440x400.jpg</image:loc><image:caption>BLHPSureView1440x400</image:caption><image:title>BLHPSureView1440x400</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/windows-10-/-server-2019-bluescreens-beim-drucken-nach-m%C3%A4rz-updates</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus%20Fumasoli.jpg</image:loc><image:caption>MarkusFumasoli</image:caption><image:title>MarkusFumasoli</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/enterprise-service-management/zukunftsbest%C3%A4ndige-it-voraussetzungen-und-mehrwerte-von-ai-ops</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Thomas-B%C3%BCcker_300x300.jpg</image:loc><image:caption>ThomasBücker300x300</image:caption><image:title>ThomasBücker300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_2024-10-31_AIOps_600x303.jpg</image:loc><image:caption>Blog20241031AIOps600x303</image:caption><image:title>Blog20241031AIOps600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/HealthLog%20Analytics%20Workflow.png</image:loc><image:caption>HealthLogAnalyticsWorkflow</image:caption><image:title>HealthLogAnalyticsWorkflow</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Strategy-%C3%9Cberischt%20ServiceNow.png</image:loc><image:caption>StrategyÜberischtServiceNow</image:caption><image:title>StrategyÜberischtServiceNow</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_2024-10-31_AIOps.png</image:loc><image:caption>Blog20241031AIOps</image:caption><image:title>Blog20241031AIOps</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Ablauf_Dynamik.png</image:loc><image:caption>AblaufDynamik</image:caption><image:title>AblaufDynamik</image:title></image:image><lastmod>2024-10-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/fido2-sicherheit-implementierung-und-vorteile</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/FIDO-2.jpg</image:loc><image:caption>FIDO2</image:caption><image:title>FIDO2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/FIDO-1.jpg</image:loc><image:caption>FIDO1</image:caption><image:title>FIDO1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/FIDO-3-1.jpg</image:loc><image:caption>FIDO31</image:caption><image:title>FIDO31</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/FIDO2_600x303.jpg</image:loc><image:caption>FIDO2600x303</image:caption><image:title>FIDO2600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Matthias-Hartmann_300x300.jpg</image:loc><image:caption>MatthiasHartmann300x300</image:caption><image:title>MatthiasHartmann300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/FIDO2_2400x600.jpg</image:loc><image:caption>FIDO22400x600</image:caption><image:title>FIDO22400x600</image:title></image:image><lastmod>2024-06-24</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/deadline-f%C3%BCr-klassisches-teams-auf-virtual-desktop</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft_Event2400x600.jpg</image:loc><image:caption>MicrosoftEvent2400x600</image:caption><image:title>MicrosoftEvent2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel%20Keller.jpg</image:loc><image:caption>DanielKeller</image:caption><image:title>DanielKeller</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/backup-hardening-warum-eine-geh%C3%A4rtete-backup-umgebung-essenziell-ist</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus-Schober_300x300.jpg</image:loc><image:caption>MarkusSchober300x300</image:caption><image:title>MarkusSchober300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_Microsoft-Defender_2400x800px.jpg</image:loc><image:caption>WebinarSecurityMicrosoftDefender2400x800px</image:caption><image:title>WebinarSecurityMicrosoftDefender2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_allgemein_600x303px.jpg</image:loc><image:caption>WebinarSecurityallgemein600x303px</image:caption><image:title>WebinarSecurityallgemein600x303px</image:title></image:image><lastmod>2025-03-25</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kabellose-logitech-produkte-als-sicherheitsrisiko</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><lastmod>2019-07-16</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/bleiben-sie-in-kontakt-mit-cisco-webex</loc><video:video><video:thumbnail_loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bithawk-Screenrecording3-EventTeilnahmebericht_1072p_h264_MST_20210510.mp4/medium.jpg</video:thumbnail_loc><video:title>Bithawk-Screenrecording3-EventTeilnahmebericht_1072p_h264_MST_20210510</video:title><video:description>Bithawk-Screenrecording3-EventTeilnahmebericht_1072p_h264_MST_20210510</video:description><video:content_loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bithawk-Screenrecording3-EventTeilnahmebericht_1072p_h264_MST_20210510.mp4</video:content_loc><video:duration>29</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bithawk-Screenrecording2-TerminOutlook_1072p_h264_MST_20210510.mp4/medium.jpg</video:thumbnail_loc><video:title>Bithawk-Screenrecording2-TerminOutlook_1072p_h264_MST_20210510</video:title><video:description>Bithawk-Screenrecording2-TerminOutlook_1072p_h264_MST_20210510</video:description><video:content_loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bithawk-Screenrecording2-TerminOutlook_1072p_h264_MST_20210510.mp4</video:content_loc><video:duration>29</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bithawk-Screenrecording1-Eventansetzen_1072p_h254_MST_20210510.mp4/medium.jpg</video:thumbnail_loc><video:title>Bithawk-Screenrecording1-Eventansetzen_1072p_h254_MST_20210510</video:title><video:description>Bithawk-Screenrecording1-Eventansetzen_1072p_h254_MST_20210510</video:description><video:content_loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bithawk-Screenrecording1-Eventansetzen_1072p_h254_MST_20210510.mp4</video:content_loc><video:duration>76</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar_Webex_600x303.jpg</image:loc><image:caption>WebinarWebex600x303</image:caption><image:title>WebinarWebex600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Sabine-Feer_320x320.jpg</image:loc><image:caption>SabineFeer320x320</image:caption><image:title>SabineFeer320x320</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cisco-Webex_1440x400px-2.jpg</image:loc><image:caption>CiscoWebex1440x400px2</image:caption><image:title>CiscoWebex1440x400px2</image:title></image:image><lastmod>2021-05-11</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/zukunftsbest%C3%A4ndige-it-cloud-und-ihre-schattenseite</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_2024-10-10_Cloud%20und%20seine%20Schattenseite_2400x600.jpg</image:loc><image:caption>Blog20241010CloudundseineSchattenseite2400x600</image:caption><image:title>Blog20241010CloudundseineSchattenseite2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cloud%20und%20seine%20Schattenseite_600x303.jpg</image:loc><image:caption>CloudundseineSchattenseite600x303</image:caption><image:title>CloudundseineSchattenseite600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><lastmod>2024-10-21</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/optimierung-der-netscaler-konfiguration-f%C3%BCr-sichere-authentifizierung</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_Microsoft-Defender_2400x800px.jpg</image:loc><image:caption>WebinarSecurityMicrosoftDefender2400x800px</image:caption><image:title>WebinarSecurityMicrosoftDefender2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel%20Keller.jpg</image:loc><image:caption>DanielKeller</image:caption><image:title>DanielKeller</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_allgemein_600x303px.jpg</image:loc><image:caption>WebinarSecurityallgemein600x303px</image:caption><image:title>WebinarSecurityallgemein600x303px</image:title></image:image><lastmod>2024-03-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/patches-f%C3%BCr-trend-micro-apex-one-und-officescan-xg</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><lastmod>2020-04-02</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/erfolgsfaktoren-aus-dem-silicon-valley</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild-Microsoft_1440x300_Test.jpg</image:loc><image:caption>BildMicrosoft1440x300Test</image:caption><image:title>BildMicrosoft1440x300Test</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild-Microsoft_1440x400-4.jpg</image:loc><image:caption>BildMicrosoft1440x4004</image:caption><image:title>BildMicrosoft1440x4004</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstelle-im-qnap-qts/quts-cve-2025-66277</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/joshua_Haefliger.png</image:loc><image:caption>joshuaHaefliger</image:caption><image:title>joshuaHaefliger</image:title></image:image><lastmod>2026-02-13</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/use-chat-gpt-to-understand-code-on-your-servicenow-instance</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Bild%20ServiceNow%20Blog.jpg</image:loc><image:caption>HeaderBildServiceNowBlog</image:caption><image:title>HeaderBildServiceNowBlog</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Jesse-Szepieniec-300x300.jpg</image:loc><image:caption>JesseSzepieniec300x300</image:caption><image:title>JesseSzepieniec300x300</image:title></image:image><lastmod>2023-08-07</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/8-llm-benchmarks-ai-llms-entmystifiziert-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_SWT_AI2_600x303.jpg</image:loc><image:caption>BlogSWTAI2600x303</image:caption><image:title>BlogSWTAI2600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-12-04-22-2206-PM.png</image:loc><image:caption>grafikpngJan3020241204222206PM</image:caption><image:title>grafikpngJan3020241204222206PM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-12-04-29-0068-PM.png</image:loc><image:caption>grafikpngJan3020241204290068PM</image:caption><image:title>grafikpngJan3020241204290068PM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_SWT_AI2_2400x800.jpg</image:loc><image:caption>BlogSWTAI22400x800</image:caption><image:title>BlogSWTAI22400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-12-05-05-8759-PM.png</image:loc><image:caption>grafikpngJan3020241205058759PM</image:caption><image:title>grafikpngJan3020241205058759PM</image:title></image:image><lastmod>2024-03-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/updates-f%C3%BCr-kritische-microsoft-schwachstellen-verf%C3%BCgbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><lastmod>2022-01-13</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/stabilit%C3%A4t-durch-vorausschauende-intelligenz</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Stabilit%C3%A4t_Intelligenz_1440x400-2.jpg</image:loc><image:caption>BLStabilitätIntelligenz1440x4002</image:caption><image:title>BLStabilitätIntelligenz1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Andreas-Corradini.jpg</image:loc><image:caption>AndreasCorradini</image:caption><image:title>AndreasCorradini</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Stabilit%C3%A4t_Intelligenz_1440x400.jpg</image:loc><image:caption>BLStabilitätIntelligenz1440x400</image:caption><image:title>BLStabilitätIntelligenz1440x400</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/veeam-informiert-%C3%BCber-eine-kritische-schwachstelle-cve-2025-23120</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2025-03-20</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/microsoft-deaktiviert-basic-authentication-auf-exchange-online</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Basic-Authentication_2400x800.jpg</image:loc><image:caption>MicrosoftBasicAuthentication2400x800</image:caption><image:title>MicrosoftBasicAuthentication2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Exchange-online_600x303.jpg</image:loc><image:caption>MicrosoftExchangeonline600x303</image:caption><image:title>MicrosoftExchangeonline600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/David-Meier_300x300.jpg</image:loc><image:caption>DavidMeier300x300</image:caption><image:title>DavidMeier300x300</image:title></image:image><lastmod>2022-06-24</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/veeam-data-cloud-f%C3%BCr-microsoft-365</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/VeeamDataCloud-Blog_600x303.jpg</image:loc><image:caption>VeeamDataCloudBlog600x303</image:caption><image:title>VeeamDataCloudBlog600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/VeeamDataCloud-Blog_2400x600.jpg</image:loc><image:caption>VeeamDataCloudBlog2400x600</image:caption><image:title>VeeamDataCloudBlog2400x600</image:title></image:image><lastmod>2025-09-18</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/7-der-billionen-dollar-boost-ai-llms-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-11-59-32-4189-AM.png</image:loc><image:caption>grafikpngJan3020241159324189AM</image:caption><image:title>grafikpngJan3020241159324189AM</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_SWT_AI4_600x303.jpg</image:loc><image:caption>BlogSWTAI4600x303</image:caption><image:title>BlogSWTAI4600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_SWT_AI4_2400x800.jpg</image:loc><image:caption>BlogSWTAI42400x800</image:caption><image:title>BlogSWTAI42400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/grafik-png-Jan-30-2024-12-00-46-2304-PM.png</image:loc><image:caption>grafikpngJan3020241200462304PM</image:caption><image:title>grafikpngJan3020241200462304PM</image:title></image:image><lastmod>2024-03-07</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/entlastung-im-berufsalltag-dank-automatisierung-und-ai</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Entlastung-im-Berufsalltag-durch-AI_600x303.jpg</image:loc><image:caption>EntlastungimBerufsalltagdurchAI600x303</image:caption><image:title>EntlastungimBerufsalltagdurchAI600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Entlastung-im-Berufsalltag-durch-AI_2400x800.jpg</image:loc><image:caption>EntlastungimBerufsalltagdurchAI2400x800</image:caption><image:title>EntlastungimBerufsalltagdurchAI2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><lastmod>2024-06-17</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/abl%C3%B6sung-exchange-online-um-durch-cloud-voicemail</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header_Abl%C3%B6sung-Exchange_2400x600px.jpg</image:loc><image:caption>HeaderAblösungExchange2400x600px</image:caption><image:title>HeaderAblösungExchange2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Rene-Felber_300x300Pixel.jpg</image:loc><image:caption>ReneFelber300x300Pixel</image:caption><image:title>ReneFelber300x300Pixel</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header_Blogbericht_800x234px.jpg</image:loc><image:caption>HeaderBlogbericht800x234px</image:caption><image:title>HeaderBlogbericht800x234px</image:title></image:image><lastmod>2019-06-04</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/hybrid-work-compass-kompass-f%C3%BCr-die-arbeitswelt-der-zukunft</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Samuel-Dumelin300x300.jpg</image:loc><image:caption>SamuelDumelin300x300</image:caption><image:title>SamuelDumelin300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Hybrid-work_600x303px.jpg</image:loc><image:caption>Hybridwork600x303px</image:caption><image:title>Hybridwork600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Hybrid-work_2400x600px-1.jpg</image:loc><image:caption>Hybridwork2400x600px1</image:caption><image:title>Hybridwork2400x600px1</image:title></image:image><lastmod>2022-04-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsl%C3%BCcke-mensch-eine-herausforderung-f%C3%BCr-unternehmen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Sicherheitsl%C3%BCcke_Mensch_1440x400.jpg</image:loc><image:caption>BLSicherheitslückeMensch1440x400</image:caption><image:title>BLSicherheitslückeMensch1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Sicherheitsl%C3%BCcke_Mensch_1440x400-1.jpg</image:loc><image:caption>BLSicherheitslückeMensch1440x4001</image:caption><image:title>BLSicherheitslückeMensch1440x4001</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/faktoren-f%C3%BCr-ein-digitales-kundenerlebnis</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_5Faktoren-digi-KD-Erlebnis_1440x400.jpg</image:loc><image:caption>BL5FaktorendigiKDErlebnis1440x400</image:caption><image:title>BL5FaktorendigiKDErlebnis1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_5Faktoren-digi-KD-Erlebnis_1440x400-3.jpg</image:loc><image:caption>BL5FaktorendigiKDErlebnis1440x4003</image:caption><image:title>BL5FaktorendigiKDErlebnis1440x4003</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/token-diebstahl-die-neue-eingangst%C3%BCr-f%C3%BCr-angreifer</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/David-Meier_300x300.jpg</image:loc><image:caption>DavidMeier300x300</image:caption><image:title>DavidMeier300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_Microsoft-Defender_2400x800px.jpg</image:loc><image:caption>WebinarSecurityMicrosoftDefender2400x800px</image:caption><image:title>WebinarSecurityMicrosoftDefender2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Microsoft-Defender%20600x303.jpg</image:loc><image:caption>SecurityMicrosoftDefender600x303</image:caption><image:title>SecurityMicrosoftDefender600x303</image:title></image:image><lastmod>2023-01-19</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/lassen-sie-hacker-im-regen-stehen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_ODW_CiscoUmbrella_600x303.jpg</image:loc><image:caption>SecurityODWCiscoUmbrella600x303</image:caption><image:title>SecurityODWCiscoUmbrella600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Stefan-Boog__300x300.jpg</image:loc><image:caption>StefanBoog300x300</image:caption><image:title>StefanBoog300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_ODW_CiscoUmbrella_2400x800.jpg</image:loc><image:caption>SecurityODWCiscoUmbrella2400x800</image:caption><image:title>SecurityODWCiscoUmbrella2400x800</image:title></image:image><lastmod>2022-03-16</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwerwiegende-l%C3%BCcke-in-sicherheits-software-von-trend-micro</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2019-04-10</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-beendet-support-f%C3%BCr-internet-explorer-11</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft_EndOfLifeM365Apps.jpg</image:loc><image:caption>MicrosoftEndOfLifeM365Apps</image:caption><image:title>MicrosoftEndOfLifeM365Apps</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px.jpg</image:loc><image:caption>SecurityStandart600x303px</image:caption><image:title>SecurityStandart600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Andrin-Kuenzler_320x320.jpg</image:loc><image:caption>AndrinKuenzler320x320</image:caption><image:title>AndrinKuenzler320x320</image:title></image:image><lastmod>2021-02-24</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-in-microsoft-wsus-cve-2025-59287</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2025-10-27</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/exchange-2016-/-2019-end-of-support-neue-exchange-version</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/David-Meier_300x300.jpg</image:loc><image:caption>DavidMeier300x300</image:caption><image:title>DavidMeier300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Exchange-Online_2400x800px-1.jpg</image:loc><image:caption>ExchangeOnline2400x800px1</image:caption><image:title>ExchangeOnline2400x800px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Exchange-Online_600x303px-1.jpg</image:loc><image:caption>ExchangeOnline600x303px1</image:caption><image:title>ExchangeOnline600x303px1</image:title></image:image><lastmod>2025-02-13</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/citrix-cloud-lizenzen-handlungsbedarf-bis-2026</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BLOG_Citrix-LAS_600x303.jpg</image:loc><image:caption>BLOGCitrixLAS600x303</image:caption><image:title>BLOGCitrixLAS600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BLOG_Citrix-LAS_2400x600.jpg</image:loc><image:caption>BLOGCitrixLAS2400x600</image:caption><image:title>BLOGCitrixLAS2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Remo.Amrein_300x300.jpg</image:loc><image:caption>RemoAmrein300x300</image:caption><image:title>RemoAmrein300x300</image:title></image:image><lastmod>2025-11-03</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/ready-for-paris-mit-servicenow</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Paris_Release_ServiceNo_2400x600-1.jpg</image:loc><image:caption>ParisReleaseServiceNo2400x6001</image:caption><image:title>ParisReleaseServiceNo2400x6001</image:title></image:image><lastmod>2020-09-07</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/hpe-greenlake-auf-das-sich-der-nebel-%C3%BCber-dem-see-lichte</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/GreenLake_Blog-Grafik2.jpg</image:loc><image:caption>GreenLakeBlogGrafik2</image:caption><image:title>GreenLakeBlogGrafik2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Greenlake_HPE_2400x800px-NEU.jpg</image:loc><image:caption>GreenlakeHPE2400x800pxNEU</image:caption><image:title>GreenlakeHPE2400x800pxNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/GreenLake_Blog-Grafik1.jpg</image:loc><image:caption>GreenLakeBlogGrafik1</image:caption><image:title>GreenLakeBlogGrafik1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Feature_Greenlake_HPE_600x303px.jpg</image:loc><image:caption>FeatureGreenlakeHPE600x303px</image:caption><image:title>FeatureGreenlakeHPE600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/G_PM_PR_GOLD_PAR_CPT_PR_PDCC_RGB_DIGITAL.jpg</image:loc><image:caption>GPMPRGOLDPARCPTPRPDCCRGBDIGITAL</image:caption><image:title>GPMPRGOLDPARCPTPRPDCCRGBDIGITAL</image:title></image:image><lastmod>2020-11-12</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/trends-im-station%C3%A4ren-handel</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL-Trend_station%C3%A4rerHandel_1440x400.jpg</image:loc><image:caption>BLTrendstationärerHandel1440x400</image:caption><image:title>BLTrendstationärerHandel1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL-Trend_station%C3%A4rerHandel_1440x400-2.jpg</image:loc><image:caption>BLTrendstationärerHandel1440x4002</image:caption><image:title>BLTrendstationärerHandel1440x4002</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/business-continuity-management-rettet-ihre-organisation-im-notfall</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ODW_BCM-Konzept-Nicole_2400x800.jpg</image:loc><image:caption>ODWBCMKonzeptNicole2400x800</image:caption><image:title>ODWBCMKonzeptNicole2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ODW_BCM-Konzept-Nicole_600x303.jpg</image:loc><image:caption>ODWBCMKonzeptNicole600x303</image:caption><image:title>ODWBCMKonzeptNicole600x303</image:title></image:image><lastmod>2021-11-30</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/update-f%C3%BCr-kritische-citrix-schwachstelle-verf%C3%BCgbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><lastmod>2021-11-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/update-verschl%C3%BCsselungs-trojaner</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><lastmod>2019-11-20</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/holistischer-microsoft-it-security-ansatz</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Jahrzente_Designfehler_1440x400.jpg</image:loc><image:caption>BLJahrzenteDesignfehler1440x400</image:caption><image:title>BLJahrzenteDesignfehler1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Jahrzente_Designfehler_1440x400-1.jpg</image:loc><image:caption>BLJahrzenteDesignfehler1440x4001</image:caption><image:title>BLJahrzenteDesignfehler1440x4001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Cybersecurity%20Industry.jpg</image:loc><image:caption>CybersecurityIndustry</image:caption><image:title>CybersecurityIndustry</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Angriffszenario.jpg</image:loc><image:caption>Angriffszenario</image:caption><image:title>Angriffszenario</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Schutz%20vor%20E-Mail-Phishing.jpg</image:loc><image:caption>SchutzvorEMailPhishing</image:caption><image:title>SchutzvorEMailPhishing</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/copilot-notebooks-datenflut-in-sekunden-in-wissen-verwandeln</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/CopilotNotebooks_DatenflutinWissenverwandeln_600x303-1.jpg</image:loc><image:caption>CopilotNotebooksDatenflutinWissenverwandeln600x3031</image:caption><image:title>CopilotNotebooksDatenflutinWissenverwandeln600x3031</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/1.png</image:loc><image:caption>1</image:caption><image:title>1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Thomas-Koch_300x300.jpg</image:loc><image:caption>ThomasKoch300x300</image:caption><image:title>ThomasKoch300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Copilot%20Notebooks%20Datenflut%20in%20Wissen%20verwandeln.jpg</image:loc><image:caption>CopilotNotebooksDatenflutinWissenverwandeln</image:caption><image:title>CopilotNotebooksDatenflutinWissenverwandeln</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/schwachstelle-in-fortiproxy-und-fortios-cve-2024-55591</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><lastmod>2025-01-15</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/citrix-schliesst-sicherheitsl%C3%BCcke-in-workspaceapp-f%C3%BCr-windows</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px.jpg</image:loc><image:caption>SecurityStandart600x303px</image:caption><image:title>SecurityStandart600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus%20Fumasoli.jpg</image:loc><image:caption>MarkusFumasoli</image:caption><image:title>MarkusFumasoli</image:title></image:image><lastmod>2021-05-27</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/citrix-informiert-%C3%BCber-kritische-schwachstelle-in-netscaler-gateway-und-netscaler-adc-cve-2025-5777</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2025-06-18</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/krack-wpa2-l%C3%BCcke</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Krack_1440x400-2.jpg</image:loc><image:caption>BLKrack1440x4002</image:caption><image:title>BLKrack1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Neztwerksteuerung_1440x400.jpg</image:loc><image:caption>BLNeztwerksteuerung1440x400</image:caption><image:title>BLNeztwerksteuerung1440x400</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/die-neue-eu-ki-verordnung-auswirkungen-auf-schweizer-unternehmen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/EU-KI-Verordnung-600x303.jpg</image:loc><image:caption>EUKIVerordnung600x303</image:caption><image:title>EUKIVerordnung600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/EU-KI-Verordnung-2400x600.jpg</image:loc><image:caption>EUKIVerordnung2400x600</image:caption><image:title>EUKIVerordnung2400x600</image:title></image:image><lastmod>2024-08-07</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/zukunftsbest%C3%A4ndige-it-konflikt-moderne-technik-und-energieeffizienz</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Markus%20Arnold.jpg</image:loc><image:caption>MarkusArnold</image:caption><image:title>MarkusArnold</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Zukunftsbest%C3%A4ndige%20IT_Server.png</image:loc><image:caption>ZukunftsbeständigeITServer</image:caption><image:title>ZukunftsbeständigeITServer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Nachhaltige%20IT-Infrastrukturen_600x303.jpg</image:loc><image:caption>NachhaltigeITInfrastrukturen600x303</image:caption><image:title>NachhaltigeITInfrastrukturen600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Nachhaltige-IT-Infrastrukturen_2400x600.gif</image:loc><image:caption>NachhaltigeITInfrastrukturen2400x600</image:caption><image:title>NachhaltigeITInfrastrukturen2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Diagramm.jpg</image:loc><image:caption>Diagramm</image:caption><image:title>Diagramm</image:title></image:image><lastmod>2024-09-10</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/cisco-umbrella-weil-sicherheit-einfach-sein-kann</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Umbrella_2400x800px.jpg</image:loc><image:caption>WebinarUmbrella2400x800px</image:caption><image:title>WebinarUmbrella2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Feature_Umbrella_600x303-1.jpg</image:loc><image:caption>FeatureUmbrella600x3031</image:caption><image:title>FeatureUmbrella600x3031</image:title></image:image><lastmod>2020-10-27</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/wallix-bastion-mehr-sicherheit-f%C3%BCr-lieferantenzug%C3%A4nge</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Microsoft-Defender%20600x303.jpg</image:loc><image:caption>SecurityMicrosoftDefender600x303</image:caption><image:title>SecurityMicrosoftDefender600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Silvan-Buehler_300x300.jpg</image:loc><image:caption>SilvanBuehler300x300</image:caption><image:title>SilvanBuehler300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_Microsoft-Defender_2400x800px.jpg</image:loc><image:caption>WebinarSecurityMicrosoftDefender2400x800px</image:caption><image:title>WebinarSecurityMicrosoftDefender2400x800px</image:title></image:image><lastmod>2023-11-23</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/on-demand-webinar-r%C3%BCsten-sie-ihr-home-office-auf</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/OnDemand-Webinar_2400x600-1.jpg</image:loc><image:caption>OnDemandWebinar2400x6001</image:caption><image:title>OnDemandWebinar2400x6001</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/OnDemand-Webinar_690x263.jpg</image:loc><image:caption>OnDemandWebinar690x263</image:caption><image:title>OnDemandWebinar690x263</image:title></image:image><lastmod>2020-04-09</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/windows-cryptoapi-spoofing-vulnerability</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2020-01-22</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/technologie-die-das-leben-erleichtert</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Technologie_erleichtertesLeben_2400x800.jpg</image:loc><image:caption>TechnologieerleichtertesLeben2400x800</image:caption><image:title>TechnologieerleichtertesLeben2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Technologie_erleichtertesLeben_600x303.jpg</image:loc><image:caption>TechnologieerleichtertesLeben600x303</image:caption><image:title>TechnologieerleichtertesLeben600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/H%C3%BCseyin-Basyildiz-300x300.jpg</image:loc><image:caption>HüseyinBasyildiz300x300</image:caption><image:title>HüseyinBasyildiz300x300</image:title></image:image><lastmod>2022-12-01</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/der-big-shift-im-ict-betrieb-der-paradigmenwechsel-geht-weiter</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ITaaS_1440x400.jpg</image:loc><image:caption>ITaaS1440x400</image:caption><image:title>ITaaS1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/PZ_2018_Arctic-bearbeitet_300x300px%20SW.jpg</image:loc><image:caption>PZ2018Arcticbearbeitet300x300pxSW</image:caption><image:title>PZ2018Arcticbearbeitet300x300pxSW</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ITaaS_2400.jpg</image:loc><image:caption>ITaaS2400</image:caption><image:title>ITaaS2400</image:title></image:image><lastmod>2019-02-07</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/microsoft-surface-f%C3%BCr-ihr-business-gemacht</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Surface_2400x600px.jpg</image:loc><image:caption>MicrosoftSurface2400x600px</image:caption><image:title>MicrosoftSurface2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft_Surface-Palette_800x234-1.jpg</image:loc><image:caption>MicrosoftSurfacePalette800x2341</image:caption><image:title>MicrosoftSurfacePalette800x2341</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><lastmod>2020-03-24</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/digital-in-die-zukunft</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%202400_600.jpg</image:loc><image:caption>Header2400600</image:caption><image:title>Header2400600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bl%C3%A4ttler%20Remo%20320x320.jpg</image:loc><image:caption>BlättlerRemo320x320</image:caption><image:title>BlättlerRemo320x320</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Bild%20Business%20Consulting_E_Mail.jpg</image:loc><image:caption>HeaderBildBusinessConsultingEMail</image:caption><image:title>HeaderBildBusinessConsultingEMail</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/4-Stufen%20Methodik%20260_260.jpg</image:loc><image:caption>4StufenMethodik260260</image:caption><image:title>4StufenMethodik260260</image:title></image:image><lastmod>2019-12-10</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-schliesst-remote-code-execution-schwachstelle</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px.jpg</image:loc><image:caption>SecurityStandart600x303px</image:caption><image:title>SecurityStandart600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-10-19</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/vmworld-2021-bithawk-informiert</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel_Stadelmann.jpg</image:loc><image:caption>DanielStadelmann</image:caption><image:title>DanielStadelmann</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/VMWorld_2021_Teilnahme_2400x600px.jpg</image:loc><image:caption>VMWorld2021Teilnahme2400x600px</image:caption><image:title>VMWorld2021Teilnahme2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/VMWorld_2021_Teilnahme_600x303px_02.jpg</image:loc><image:caption>VMWorld2021Teilnahme600x303px02</image:caption><image:title>VMWorld2021Teilnahme600x303px02</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/WMworld2019_Homeoffice_800x389.jpg</image:loc><image:caption>WMworld2019Homeoffice800x389</image:caption><image:title>WMworld2019Homeoffice800x389</image:title></image:image><lastmod>2021-10-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/sicherheitsluecke-in-vcenter-cve-2023-34048</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2023-10-25</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/fortigate_sslvpn_cve-2023-27997</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2023-06-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/neue-kritische-schwachstellen-in-microsoft-exchange</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-04-15</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/conditional-access-neue-best-practices-features</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Conditional%20Access%20Policy%20Engine.jpg</image:loc><image:caption>ConditionalAccessPolicyEngine</image:caption><image:title>ConditionalAccessPolicyEngine</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Silvan-Buehler_300x300.jpg</image:loc><image:caption>SilvanBuehler300x300</image:caption><image:title>SilvanBuehler300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Silverfort_600x303-1.jpg</image:loc><image:caption>BlogSilverfort600x3031</image:caption><image:title>BlogSilverfort600x3031</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Silverfort_2400x600.jpg</image:loc><image:caption>BlogSilverfort2400x600</image:caption><image:title>BlogSilverfort2400x600</image:title></image:image><lastmod>2025-06-16</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Chatbot_1440x400-2.jpg</image:loc><image:caption>Chatbot1440x4002</image:caption><image:title>Chatbot1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/ITaaS_1440x400.jpg</image:loc><image:caption>ITaaS1440x400</image:caption><image:title>ITaaS1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_OldEconomy_1440x400-NEU-1.jpg</image:loc><image:caption>BLOldEconomy1440x400NEU1</image:caption><image:title>BLOldEconomy1440x400NEU1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Covid19_Bericht_Terry_2400x800px.jpg</image:loc><image:caption>Covid19BerichtTerry2400x800px</image:caption><image:title>Covid19BerichtTerry2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_5Erfolgsfaktoren-Microsoft-Teams_1440x400-2.jpg</image:loc><image:caption>BL5ErfolgsfaktorenMicrosoftTeams1440x4002</image:caption><image:title>BL5ErfolgsfaktorenMicrosoftTeams1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_UseCasesKundenansprache_1440x400-2.jpg</image:loc><image:caption>BLUseCasesKundenansprache1440x4002</image:caption><image:title>BLUseCasesKundenansprache1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_5Erfolgsfaktoren-Microsoft-Teams_1440x400-3.jpg</image:loc><image:caption>BL5ErfolgsfaktorenMicrosoftTeams1440x4003</image:caption><image:title>BL5ErfolgsfaktorenMicrosoftTeams1440x4003</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BitHawk_November2018%20Theme/Images/MG_5711-v2__FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd.jpg</image:loc><image:caption>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:caption><image:title>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Bild%20Business%20Consulting_E_Mail.jpg</image:loc><image:caption>HeaderBildBusinessConsultingEMail</image:caption><image:title>HeaderBildBusinessConsultingEMail</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Chtabos_unschlagbar_1440x400-2.jpg</image:loc><image:caption>BLChtabosunschlagbar1440x4002</image:caption><image:title>BLChtabosunschlagbar1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-CoPilot-Serie_Huseyin_600x303-2.jpg</image:loc><image:caption>MicrosoftCoPilotSerieHuseyin600x3032</image:caption><image:title>MicrosoftCoPilotSerieHuseyin600x3032</image:title></image:image><lastmod>2018-12-14</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/zukunftsbest%C3%A4ndige-it-edge-computing-wenn-die-cloud-nicht-ausreicht</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Adrian-Bombelka_300x300.jpg</image:loc><image:caption>AdrianBombelka300x300</image:caption><image:title>AdrianBombelka300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild1.png</image:loc><image:caption>Bild1</image:caption><image:title>Bild1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_2024-11-21_Edge%20Computing.png</image:loc><image:caption>Blog20241121EdgeComputing</image:caption><image:title>Blog20241121EdgeComputing</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild2.png</image:loc><image:caption>Bild2</image:caption><image:title>Bild2</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_2024-11-21_Edge%20Computing_600x303-1.jpg</image:loc><image:caption>Blog20241121EdgeComputing600x3031</image:caption><image:title>Blog20241121EdgeComputing600x3031</image:title></image:image><lastmod>2024-11-19</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/zero-day-schwachstelle-in-der-sonicwall-sma-produktserie</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2021-02-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Microsoft-TeamsMeeting-Links_600x303.jpg</image:loc><image:caption>BlogMicrosoftTeamsMeetingLinks600x303</image:caption><image:title>BlogMicrosoftTeamsMeetingLinks600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BitHawk_November2018%20Theme/Images/MG_5711-v2__FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd.jpg</image:loc><image:caption>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:caption><image:title>MG5711v2FocusFillWzE0NDAsNTUwLCJ5IiwyMDRd</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2020-12-18</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/9-llm-humanoid-robots-ai-llms-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Humanoid_Robots.png</image:loc><image:caption>HumanoidRobots</image:caption><image:title>HumanoidRobots</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/9-LLMHumanoidRobots_600x303.jpg</image:loc><image:caption>9LLMHumanoidRobots600x303</image:caption><image:title>9LLMHumanoidRobots600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/9-LLMHumanoidRobots_2400x800.jpg</image:loc><image:caption>9LLMHumanoidRobots2400x800</image:caption><image:title>9LLMHumanoidRobots2400x800</image:title></image:image><lastmod>2024-04-04</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/cisco-asa-cve-2024-20353</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2024-04-25</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/microsoft-defender-for-business</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Microsoft-Defender%20600x303.jpg</image:loc><image:caption>SecurityMicrosoftDefender600x303</image:caption><image:title>SecurityMicrosoftDefender600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Security_Microsoft-Defender_2400x800px.jpg</image:loc><image:caption>WebinarSecurityMicrosoftDefender2400x800px</image:caption><image:title>WebinarSecurityMicrosoftDefender2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/2_Suspicious%20PowerShell%20command%20line.jpg</image:loc><image:caption>2SuspiciousPowerShellcommandline</image:caption><image:title>2SuspiciousPowerShellcommandline</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/3_Configuration%20settings.jpg</image:loc><image:caption>3Configurationsettings</image:caption><image:title>3Configurationsettings</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft%20Defender%20for%20Business%201.jpg</image:loc><image:caption>MicrosoftDefenderforBusiness1</image:caption><image:title>MicrosoftDefenderforBusiness1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/1_Thread%20&amp;%20Vulnerability%20Management%20dashboard.jpg</image:loc><image:caption>1ThreadVulnerabilityManagementdashboard</image:caption><image:title>1ThreadVulnerabilityManagementdashboard</image:title></image:image><lastmod>2022-06-24</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/chatbots-support-alternative-in-unternehmen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Chtabos_unschlagbar_1440x400-2.jpg</image:loc><image:caption>BLChtabosunschlagbar1440x4002</image:caption><image:title>BLChtabosunschlagbar1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Chtabos_unschlagbar_1440x400.jpg</image:loc><image:caption>BLChtabosunschlagbar1440x400</image:caption><image:title>BLChtabosunschlagbar1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Bild%20Philip.jpg</image:loc><image:caption>BildPhilip</image:caption><image:title>BildPhilip</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/hpe-dhci-f%C3%BCr-optimales-zusammenspiel-und-agilit%C3%A4t</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/HPE-dHCI_600x303-2.jpg</image:loc><image:caption>HPEdHCI600x3032</image:caption><image:title>HPEdHCI600x3032</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/HPE-dHCI_2400x800-2.jpg</image:loc><image:caption>HPEdHCI2400x8002</image:caption><image:title>HPEdHCI2400x8002</image:title></image:image><lastmod>2022-10-31</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/drei-szenarien-f%C3%BCr-den-einsatz-von-egnyte</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Roland-Marti.jpg</image:loc><image:caption>RolandMarti</image:caption><image:title>RolandMarti</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header%20Egnyte_2400x600.jpg</image:loc><image:caption>HeaderEgnyte2400x600</image:caption><image:title>HeaderEgnyte2400x600</image:title></image:image><lastmod>2019-11-07</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/ist-die-cloud-wirklich-zu-teuer-unser-blick-auf-kosten-und-vorteile</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Cloud-teuer_2400x600.jpg</image:loc><image:caption>BlogCloudteuer2400x600</image:caption><image:title>BlogCloudteuer2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Kamer_Pascal_300x300.jpg</image:loc><image:caption>KamerPascal300x300</image:caption><image:title>KamerPascal300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Cloud_600x303.jpg</image:loc><image:caption>BlogCloud600x303</image:caption><image:title>BlogCloud600x303</image:title></image:image><lastmod>2024-11-05</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/citrix-license-server-update-erforderlich</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel%20Keller.jpg</image:loc><image:caption>DanielKeller</image:caption><image:title>DanielKeller</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Citrix-License-ServerUpdate_2400x800.jpg</image:loc><image:caption>CitrixLicenseServerUpdate2400x800</image:caption><image:title>CitrixLicenseServerUpdate2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Citrix-License-ServerUpdate_600x303.jpg</image:loc><image:caption>CitrixLicenseServerUpdate600x303</image:caption><image:title>CitrixLicenseServerUpdate600x303</image:title></image:image><lastmod>2023-03-16</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/update-f%C3%BCr-kritische-hp-druckerschwachstelle-verf%C3%BCgbar</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_1440x600px.jpg</image:loc><image:caption>BlogSecScorecard1440x600px</image:caption><image:title>BlogSecScorecard1440x600px</image:title></image:image><lastmod>2021-12-09</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/globale-preisanpassungen-f%C3%BCr-die-microsoft-cloud</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Off365-Blog_600x303.jpg</image:loc><image:caption>MicrosoftOff365Blog600x303</image:caption><image:title>MicrosoftOff365Blog600x303</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft-Off365-Blog_2400x600.jpg</image:loc><image:caption>MicrosoftOff365Blog2400x600</image:caption><image:title>MicrosoftOff365Blog2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Heiri-B%C3%A4ttig.jpg</image:loc><image:caption>HeiriBättig</image:caption><image:title>HeiriBättig</image:title></image:image><lastmod>2023-07-12</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstelle-in-microsoft-rras-update-erforderlich</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><lastmod>2023-07-13</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/windows-10-updates-mit-configuration-manager-nicht-freigegeben</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px.jpg</image:loc><image:caption>SecurityStandart600x303px</image:caption><image:title>SecurityStandart600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Patrik-Schumacher.jpg</image:loc><image:caption>PatrikSchumacher</image:caption><image:title>PatrikSchumacher</image:title></image:image><lastmod>2021-04-22</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstellen-in-microsoft-exchange</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px.jpg</image:loc><image:caption>SecurityStandart600x303px</image:caption><image:title>SecurityStandart600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2021-03-04</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/tipps-zur-reduktion-von-spam-und-phishing</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL-Tipps_Reduktion_Spam_Phishing_1440x400-NEU-1.jpg</image:loc><image:caption>BLTippsReduktionSpamPhishing1440x400NEU1</image:caption><image:title>BLTippsReduktionSpamPhishing1440x400NEU1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL-Tipps_Reduktion_Spam_Phishing_1440x400-NEU.jpg</image:loc><image:caption>BLTippsReduktionSpamPhishing1440x400NEU</image:caption><image:title>BLTippsReduktionSpamPhishing1440x400NEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/log4shell-was-sie-als-n%C3%A4chstes-tun-sollte</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_2400x600px-1.jpg</image:loc><image:caption>BlogSecScorecard2400x600px1</image:caption><image:title>BlogSecScorecard2400x600px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><lastmod>2021-12-20</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/kritische-schwachstelle-in-forticlientems-cve-2026-21643</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/joshua_Haefliger.png</image:loc><image:caption>joshuaHaefliger</image:caption><image:title>joshuaHaefliger</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><lastmod>2026-02-10</lastmod></url><url><loc>https://blog.bithawk.ch/artificial-intelligence/10-revolution-der-large-action-models-bots-ai-llms-f%C3%BCr-entscheidungstr%C3%A4ger</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/10_Revolution%20der%20Large%20Action%20Models_690x263-2.jpg</image:loc><image:caption>10RevolutionderLargeActionModels690x2632</image:caption><image:title>10RevolutionderLargeActionModels690x2632</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/10_Revolution%20der%20Large%20Action%20Models_690x263-1.jpg</image:loc><image:caption>10RevolutionderLargeActionModels690x2631</image:caption><image:title>10RevolutionderLargeActionModels690x2631</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Terrence-Schweizer.jpg</image:loc><image:caption>TerrenceSchweizer</image:caption><image:title>TerrenceSchweizer</image:title></image:image><lastmod>2024-06-11</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/https/blog.bithawk.ch/it-security/sicherheitskritische-l%C3%BCcke-in-hpe-storeserv-management-console-ssmc</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/HPEStoreServ_234px-1.jpg</image:loc><image:caption>HPEStoreServ234px1</image:caption><image:title>HPEStoreServ234px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel_Stadelmann.jpg</image:loc><image:caption>DanielStadelmann</image:caption><image:title>DanielStadelmann</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2020-12-18</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/mehrere-kritische-sicherheitsl%C3%BCcken-in-veeam-backup-replication</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_2400x600px-1.jpg</image:loc><image:caption>BlogSecScorecard2400x600px1</image:caption><image:title>BlogSecScorecard2400x600px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Manojlo-Mitrovic.jpg</image:loc><image:caption>ManojloMitrovic</image:caption><image:title>ManojloMitrovic</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><lastmod>2022-03-18</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/den-menschen-mit-seinen-bed%C3%BCrfnissen-in-den-mittelpunkt-r%C3%BCcken</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Microsoft_Event2400x600.jpg</image:loc><image:caption>MicrosoftEvent2400x600</image:caption><image:title>MicrosoftEvent2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/H%C3%BCseyin-Basyildiz-300x300.jpg</image:loc><image:caption>HüseyinBasyildiz300x300</image:caption><image:title>HüseyinBasyildiz300x300</image:title></image:image><lastmod>2022-11-08</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/so-sch%C3%BCtzen-sie-ihre-accounts-vor-identit%C3%A4tsdiebstahl</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/MFA-Headerbild_2400x600px.jpg</image:loc><image:caption>MFAHeaderbild2400x600px</image:caption><image:title>MFAHeaderbild2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Silvan-Buehler_300x300.jpg</image:loc><image:caption>SilvanBuehler300x300</image:caption><image:title>SilvanBuehler300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild_Azure_MFA-1.jpg</image:loc><image:caption>BildAzureMFA1</image:caption><image:title>BildAzureMFA1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bild_MFA_800x500px.jpg</image:loc><image:caption>BildMFA800x500px</image:caption><image:title>BildMFA800x500px</image:title></image:image><lastmod>2020-03-10</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/microsoft-azure-update-management-jede-unternehmensgr%C3%B6sse-passt</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Azure_2400x800px.jpg</image:loc><image:caption>WebinarAzure2400x800px</image:caption><image:title>WebinarAzure2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Pirmin_Felber_305B7546.jpg</image:loc><image:caption>PirminFelber305B7546</image:caption><image:title>PirminFelber305B7546</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Webinar-Azure_600x303px.jpg</image:loc><image:caption>WebinarAzure600x303px</image:caption><image:title>WebinarAzure600x303px</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/cisco-wechselt-root-ca-firewalls-aktualisieren</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_2400x600px-1.jpg</image:loc><image:caption>BlogSecScorecard2400x600px1</image:caption><image:title>BlogSecScorecard2400x600px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Autorenprofil_H%C3%A4nggi_Patrik.jpg</image:loc><image:caption>AutorenprofilHänggiPatrik</image:caption><image:title>AutorenprofilHänggiPatrik</image:title></image:image><lastmod>2022-03-03</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/citrix-schliesst-sicherheitsl%C3%BCcke-im-user-profile-management</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel%20Keller.jpg</image:loc><image:caption>DanielKeller</image:caption><image:title>DanielKeller</image:title></image:image><lastmod>2021-07-14</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/drei-use-cases-datensicherheit-und-vertrauliche-daten</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bachmann_Sandro_Blogautor.jpg</image:loc><image:caption>BachmannSandroBlogautor</image:caption><image:title>BachmannSandroBlogautor</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_3Usecases_Datensicherheit_1440x400.jpg</image:loc><image:caption>BL3UsecasesDatensicherheit1440x400</image:caption><image:title>BL3UsecasesDatensicherheit1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_3Usecases_Datensicherheit_1440x400-1.jpg</image:loc><image:caption>BL3UsecasesDatensicherheit1440x4001</image:caption><image:title>BL3UsecasesDatensicherheit1440x4001</image:title></image:image><lastmod>2018-12-31</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/fehlerhinweis-ipu</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Giovi_DeRosa.jpg</image:loc><image:caption>GioviDeRosa</image:caption><image:title>GioviDeRosa</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><lastmod>2020-01-20</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/cve-2020-1350-vulnerability-in-windows-dns</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400.jpg</image:loc><image:caption>SecurityUpdate1440x400</image:caption><image:title>SecurityUpdate1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Update_1440x400-1.jpg</image:loc><image:caption>SecurityUpdate1440x4001</image:caption><image:title>SecurityUpdate1440x4001</image:title></image:image><lastmod>2020-07-16</lastmod></url><url><loc>https://blog.bithawk.ch/de/enterprise-service-management/bithawk-translation-app-service-now</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Header_Service-Management_2400x600px.jpg</image:loc><image:caption>HeaderServiceManagement2400x600px</image:caption><image:title>HeaderServiceManagement2400x600px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Service-Management_2400x600px-1.jpg</image:loc><image:caption>ServiceManagement2400x600px1</image:caption><image:title>ServiceManagement2400x600px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Martin-Estermann_320x320.jpg</image:loc><image:caption>MartinEstermann320x320</image:caption><image:title>MartinEstermann320x320</image:title></image:image><lastmod>2019-09-26</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/preisanpassungen-bei-microsoft-csp-lizenzen-per-01.04.25</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Thomas-Schwarz-1_300x300.jpg</image:loc><image:caption>ThomasSchwarz1300x300</image:caption><image:title>ThomasSchwarz1300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Licensing_2400x600.jpg</image:loc><image:caption>BlogLicensing2400x600</image:caption><image:title>BlogLicensing2400x600</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-Licensing_2400x600-1.jpg</image:loc><image:caption>BlogLicensing2400x6001</image:caption><image:title>BlogLicensing2400x6001</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/citrix-informiert-%C3%BCber-kritische-schwachstelle-in-netscaler-gateway-und-netscaler-adc-cve-2025-7775</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Edgar-Kappes.jpg</image:loc><image:caption>EdgarKappes</image:caption><image:title>EdgarKappes</image:title></image:image><lastmod>2025-08-26</lastmod></url><url><loc>https://blog.bithawk.ch/blog-digitale-transformation/wann-%C3%BCber-den-wandel-nachdenken</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Lachen_Seismograph_1440x400.jpg</image:loc><image:caption>BLLachenSeismograph1440x400</image:caption><image:title>BLLachenSeismograph1440x400</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/BL_Lachen_Seismograph_1440x400-2.jpg</image:loc><image:caption>BLLachenSeismograph1440x4002</image:caption><image:title>BLLachenSeismograph1440x4002</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Autoren/Oliver-Schalch.jpg</image:loc><image:caption>OliverSchalch</image:caption><image:title>OliverSchalch</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/teams-meetings-einladungen-safe-links-richtig-einstellen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Microsoft-TeamsMeeting-Links_2400x800.jpg</image:loc><image:caption>BlogMicrosoftTeamsMeetingLinks2400x800</image:caption><image:title>BlogMicrosoftTeamsMeetingLinks2400x800</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Michael-Lichtsteiner300x300.jpg</image:loc><image:caption>MichaelLichtsteiner300x300</image:caption><image:title>MichaelLichtsteiner300x300</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog_Microsoft-TeamsMeeting-Links_600x303.jpg</image:loc><image:caption>BlogMicrosoftTeamsMeetingLinks600x303</image:caption><image:title>BlogMicrosoftTeamsMeetingLinks600x303</image:title></image:image><lastmod>2025-09-08</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/nur-vorsorgliches-handeln-sch%C3%BCtzt-vor-cyberstress</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Daniel-Kaufmann-NEU.jpg</image:loc><image:caption>DanielKaufmannNEU</image:caption><image:title>DanielKaufmannNEU</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Statistik--SecScorecard_800x.jpg</image:loc><image:caption>StatistikSecScorecard800x</image:caption><image:title>StatistikSecScorecard800x</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_2400x600px-1.jpg</image:loc><image:caption>BlogSecScorecard2400x600px1</image:caption><image:title>BlogSecScorecard2400x600px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Blog-SecScorecard_600x303px.jpg</image:loc><image:caption>BlogSecScorecard600x303px</image:caption><image:title>BlogSecScorecard600x303px</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/removable-storage-so-sch%C3%BCtzen-sie-ihre-daten</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Exchange-Online_600x303px.jpg</image:loc><image:caption>ExchangeOnline600x303px</image:caption><image:title>ExchangeOnline600x303px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Roger%20St%C3%B6ckli.jpg</image:loc><image:caption>RogerStöckli</image:caption><image:title>RogerStöckli</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Exchange-Online_2400x800px.jpg</image:loc><image:caption>ExchangeOnline2400x800px</image:caption><image:title>ExchangeOnline2400x800px</image:title></image:image><lastmod>2023-04-04</lastmod></url><url><loc>https://blog.bithawk.ch/enterprise-cloud/abenteuer-kollaborationsl%C3%B6sung-gemeinsam-zum-erfolg</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Headerbild_Collaboration_1440x400%20Pixel.jpg</image:loc><image:caption>HeaderbildCollaboration1440x400Pixel</image:caption><image:title>HeaderbildCollaboration1440x400Pixel</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Bl%C3%A4ttler%20Remo%20320x320.jpg</image:loc><image:caption>BlättlerRemo320x320</image:caption><image:title>BlättlerRemo320x320</image:title></image:image><lastmod>2019-04-18</lastmod></url><url><loc>https://blog.bithawk.ch/it-security/updates-f%C3%BCr-citrix-dos-und-privilege-escalation-schwachstellen</loc><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_600x303px-1.jpg</image:loc><image:caption>SecurityStandart600x303px1</image:caption><image:title>SecurityStandart600x303px1</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Security_Standart_2400x800px.jpg</image:loc><image:caption>SecurityStandart2400x800px</image:caption><image:title>SecurityStandart2400x800px</image:title></image:image><image:image><image:loc>https://2625779.fs1.hubspotusercontent-na1.net/hubfs/2625779/Fabio-Francioni_300x300.jpg</image:loc><image:caption>FabioFrancioni300x300</image:caption><image:title>FabioFrancioni300x300</image:title></image:image><lastmod>2024-07-10</lastmod></url></urlset>