<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/shortnews/ransomware-rekord-deutschland</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T10:26:27+00:00</news:publication_date>
			<news:title><![CDATA[Ransomware-Rekord: Deutschland rückt auf Platz drei vor]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hacker-erwischen-itron</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T09:44:00+00:00</news:publication_date>
			<news:title><![CDATA[Hacker erwischen Smart-Meter-Riesen Itron]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-in-firmen-viel-genutzt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T09:05:00+00:00</news:publication_date>
			<news:title><![CDATA[KI in Firmen viel genutzt - Schulungen oft Mangelware]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bundeswehr-nicht-palantir-software</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T08:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Palantir-Software: Bundeswehr schließt sie aus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cursor-agent-produktivdatenbank</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T07:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Cursor-Agent löscht Produktivdatenbank in neun Sekunden]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/thought-leadership/das-icon-ghetto</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T06:36:00+00:00</news:publication_date>
			<news:title><![CDATA[Icon-Ghetto: Warum Ihr Desktop-Chaos die Rendite frisst]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/windows-11-sicherheit-gratis-schutz</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T06:24:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Windows 11 Sicherheit: Reicht der Gratis-Schutz?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/gescheiterte-hypes-investitionen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T05:41:55+00:00</news:publication_date>
			<news:title><![CDATA[Die spektakulärsten Flops der IT-Geschichte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/prompten-fuehren</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T05:21:32+00:00</news:publication_date>
			<news:title><![CDATA[Sie prompten besser als Sie führen. Das ist kein Kompliment.]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/phishing-attacken-signal-schutz</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T05:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Phishing-Attacken bei Signal: Mehr Schutz versprochen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hunderte-angriffe-pro-tag-haefen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T05:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Hunderte Angriffe pro Tag auf deutsche Häfen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/usb-c-fuer-laptops-in-der-eu-pflicht</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T04:50:00+00:00</news:publication_date>
			<news:title><![CDATA[USB-C wird für alle Laptops in der EU Pflicht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hackerangriff-auf-kreis-ahrweiler</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T04:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Hackerangriff auf Kreis Ahrweiler]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/elon-musk-chatgpt-openai-gericht</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T04:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Vorwürfe von Elon Musk gegen ChatGPT-Firma OpenAI vor Gericht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/rekordwerte-malware-lieferketten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T04:19:49+00:00</news:publication_date>
			<news:title><![CDATA[Rekordwerte bei Malware und Angriffe auf Lieferketten im März 2026]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/digitalisierung/ein-jahr-digitalministerium</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T04:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Ein Jahr Digitalministerium: Viel angestoßen, wenig fertig]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/thought-leadership/sci-fi-leadership-picard-vader</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T03:42:51+00:00</news:publication_date>
			<news:title><![CDATA[Sci-Fi-Leadership: Captain Picard ist der bessere CIO]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/ende-website-ki-internet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-28T03:09:07+00:00</news:publication_date>
			<news:title><![CDATA[Wie KI das Internet neu organisiert: Das Ende der Website?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/russland-hinter-signal-attacke</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T15:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Bundesregierung vermutet Russland hinter Signal-Attacke]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/loesungen-gnss-jamming-und-spoofing</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T14:32:13+00:00</news:publication_date>
			<news:title><![CDATA[IT-Systeme schützen: Lösungen gegen GNSS-Jamming und Spoofing]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/cybersecurity-fuhrungskrafte</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T13:28:00+00:00</news:publication_date>
			<news:title><![CDATA[Warum Cybersecurity keine reine IT-Frage mehr ist – und was Führungskräfte jetzt tun müssen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bsi-massstaebe-cloud-souveraenitaet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T12:35:00+00:00</news:publication_date>
			<news:title><![CDATA[BSI setzt neue Maßstäbe für Cloud-Souveränität]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/microsoft-windows-insider-programm</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T11:46:04+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft strukturiert Windows Insider Programm um]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/china-verhindert-ki-vorstoss-von-meta</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T10:55:00+00:00</news:publication_date>
			<news:title><![CDATA[China verhindert KI-Vorstoß von Meta]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/dora-und-nis-2</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T10:31:00+00:00</news:publication_date>
			<news:title><![CDATA[DORA und NIS-2: Warum die Zeit für den Finanzsektor und kritische Infrastrukturen jetzt drängt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cyberangriffe-108-tage-unentdeckt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T10:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Cyberangriffe bleiben im Schnitt 108 Tage unentdeckt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/digitale-zwillinge-klinische-studien</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T09:39:25+00:00</news:publication_date>
			<news:title><![CDATA[Digitale Zwillinge: Klinische Studien ohne Menschen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisco-firewalls-malware-firestarter</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T08:36:37+00:00</news:publication_date>
			<news:title><![CDATA[Cisco-Firewalls: Malware FIRESTARTER]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/krise-samsung-mx-2026-erster-verlust</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T08:16:49+00:00</news:publication_date>
			<news:title><![CDATA[Krise bei Samsung MX: Droht 2026 der erste operative Verlust?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/unternehmen-kaempfen-ki-experten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T07:35:17+00:00</news:publication_date>
			<news:title><![CDATA[Unternehmen kämpfen um die wenigen KI-Experten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/microsoft-copilot-aus-per-knopfdruck</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T07:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Copilot-Aus per Knopfdruck: Deinstallation möglich]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/telekom-kuendigt-eigene-epa-an</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T06:40:14+00:00</news:publication_date>
			<news:title><![CDATA[Telekom kündigt eigene ePA an]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/kyber-ransomware</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T06:02:14+00:00</news:publication_date>
			<news:title><![CDATA[Kyber Ransomware: Post-Quanten-Kryptografie]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/industrie-geldwaesche</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T05:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Industrialisierte Geldwäsche: „Mule-Account-Fabriken“]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/cloud-computing/ransomware-3-0-strong-consistency</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T04:25:33+00:00</news:publication_date>
			<news:title><![CDATA[Ransomware 3.0: "Strong Consistency" als Überlebensstrategie]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/multi-actor-intrusion</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T03:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Multi-Actor Intrusion: Wenn nicht einer, sondern zwei Angreifer im Netzwerk wirken]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/thought-leadership/ki-produktivitaet-workslop</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T03:07:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Produktivität: Workslop bremst Effizienz von Unternehmen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hackerangriff-auf-bitwarden</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T16:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Hackerangriff auf Bitwarden: Supply-Chain-Malware]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/europas-ki-markt-im-wandel</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T14:19:54+00:00</news:publication_date>
			<news:title><![CDATA[Europas KI-Markt im Wandel]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->