{"id":7507,"date":"2026-02-10T14:51:58","date_gmt":"2026-02-10T14:51:58","guid":{"rendered":"https:\/\/locaterisk.com\/?p=7507"},"modified":"2026-02-10T15:10:55","modified_gmt":"2026-02-10T15:10:55","slug":"preemptive-intelligence","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/preemptive-intelligence\/","title":{"rendered":"Preemptive intelligence - closing vulnerabilities faster"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Identify and close IT vulnerabilities even before they are officially listed.<\/h1>\r\n            <p class=\"paragraph\"><br><br>The discovery of <strong>12 critical vulnerabilities in OpenSSL<\/strong> in January 2026 by the <strong>AISLE research project<\/strong> illustrates a structural deficit in the software supply chain. What is particularly worrying is that the CVE-2025-68160 vulnerability had been present in the source code since 1998. The fact that this 28-year-old vulnerability has only now been identified is due to a decisive technological factor: it was detected by artificial intelligence (AI).<br><\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"434\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/02\/Blog-Post-Preemptive-Intelligence-800-2.png\" alt=\"\" class=\"wp-image-7526\" style=\"object-fit:cover;width:824px;height:auto\"\/><figcaption class=\"wp-element-caption\">AI shortens the time from exploit to attack - LocateRisk Preemptive Intelligence shortens your response time.<\/figcaption><\/figure><\/div>\n\n\n<p>This is a turning point for IT managers: when AI identifies and exploits vulnerabilities fully automatically, solutions are needed that recognize risks even if they are not yet officially documented. LocateRisk has integrated Preemptive Intelligence into its EASM and VRM solutions for this purpose. The aim is to close the information gap between a risk becoming known and its official listing by the National Vulnerability Database (NVD) and to enable companies to act immediately.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The new speed: exploits in minutes<\/h3>\n\n\n\n<p>The use of AI by security researchers is only one side of the coin. In the hands of attackers, this technology fundamentally changes the time scale of cyber attacks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automated exploit generation: <\/strong>In future, AI models will analyze the underlying error within a few minutes of a software update or bug report being published and develop functional exploits.<\/li>\n\n\n\n<li><strong>Race against time: <\/strong>The time between a vulnerability becoming known and the first attempted attack is drastically reduced. Conventional patch cycles, which take days or weeks, cannot keep up with this pace. The update has often not yet reached the company's deployment process, while the systems are already under attack.<\/li>\n\n\n\n<li><strong>Focus on the external attack surface: <\/strong>As OpenSSL forms the backbone of Internet encryption (TLS), these vulnerabilities can be triggered directly via the public Internet. Not only core IT is affected, but also shadow IT in particular: forgotten dev servers, outdated VPN gateways or cloud instances that operate outside of central control. The BSI also describes the explosive nature of continuous attack surface management in its latest situation report (link):<strong> \u201eProtecting attack surfaces will be the decisive lever for improving cyber security in 2026.\u201c<\/strong><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">The data vacuum: when the NVD becomes a bottleneck<\/h3>\n\n\n\n<p>A central problem in vulnerability management is the existing mapping deficit. Many companies rely primarily on publications from the National Vulnerability Database (NVD). However, this institution has been struggling with considerable backlogs in the enrichment of metadata since 2024.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Delay: I<\/strong>n March 2025, 25,000 CVEs were awaiting analysis, almost 50% more than in August 2024. Although NIST has taken action, a significant backlog remains.<\/li>\n\n\n\n<li><strong>Consequence: <\/strong>In an environment where AI exploits emerge within minutes, waiting for official database updates is a high security risk for the IT infrastructure.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The shortcut: Preemptive Intelligence from LocateRisk<\/strong><\/h3>\n\n\n\n<p>By identifying critical software versions immediately after vulnerability discovery, LocateRisk shortens the so-called mapping gap. While many solutions wait for the NVD (National Vulnerability Database) analysis, leaving companies blind to new threats for days, LocateRisk EASM (External Attack Surface Management) with Preemptive Intelligence compensates for this dangerous loss of time and notifies you even before the official mapping. You gain a head start and can initiate the necessary protective measures immediately. More about the <a href=\"https:\/\/locaterisk.com\/en\/landing\/it-risikoanalyse\/\" type=\"link\" id=\"https:\/\/locaterisk.com\/de\/landing\/it-risikoanalyse\/\" target=\"_blank\" rel=\"noreferrer noopener\">External Attack Surface Management (EASM) <\/a><\/p>\n\n\n\n<p>An OpenSSL gap in your infrastructure is a problem - a gap at your critical IT service provider is quickly a disaster. LocateRisk also enables you to continuously and automatically monitor the security situation of third-party providers and the entire supply chain. Learn more about the <a href=\"https:\/\/locaterisk.com\/en\/landing\/vendor-risk-management-leicht-gemacht\/\" type=\"link\" id=\"https:\/\/locaterisk.com\/de\/landing\/vendor-risk-management-leicht-gemacht\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vendor Risk Management (VRM) <\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>The AI discovery of the OpenSSL vulnerabilities is a wake-up call. The defense of your IT infrastructure can only keep pace with developments through high automation and speed in the security process. Preemptive Intelligence makes an important contribution to this.<\/p>\n\n\n\n<p>Further information and sources<br>BSI (Federal Office for Information Security): <a href=\"https:\/\/www.bsi.bund.de\/\" target=\"_blank\" rel=\"noreferrer noopener\">Requirements for resilience to automated attacks and NIS-2<\/a><br>NVD's Vulnerability Backlog Keeps Growing <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/nvd-revamps-operations-cve-surge\/#:~:text=NVD's%20Vulnerability%20Backlog%20Keeps%20Growing,still%20growing%2C%E2%80%9D%20Brewer%20said\" type=\"link\" id=\"https:\/\/www.infosecurity-magazine.com\/news\/nvd-revamps-operations-cve-surge\/#:~:text=NVD's%20Vulnerability%20Backlog%20Keeps%20Growing,still%20growing%2C%E2%80%9D%20Brewer%20said\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><br>AISLE Research: <a href=\"https:\/\/aisle.com\/blog\/aisle-discovered-12-out-of-12-openssl-vulnerabilities\" type=\"link\" id=\"https:\/\/aisle.com\/blog\/aisle-discovered-12-out-of-12-openssl-vulnerabilities\" target=\"_blank\" rel=\"noreferrer noopener\">Analysis of the use of AI in automated vulnerability identification (Technical Report 2026).<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"preemptive-intelligence\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>How to use preemptive intelligence to secure critical software as soon as it becomes known and shorten the time to action<\/p>","protected":false},"author":8,"featured_media":7535,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[85,86,87],"class_list":["post-7507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-openssl","tag-preemptive-intelligence","tag-schwachstellenmanagement"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen - LocateRisk<\/title>\n<meta name=\"description\" content=\"Wie Sie mit Preemptive Intelligence kritische Software sofort nach Bekanntmachung absichern und die &quot;Time-to-Action&quot; verk\u00fcrzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/preemptive-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Wie Sie mit Preemptive Intelligence kritische Software sofort nach Bekanntmachung absichern und die &quot;Time-to-Action&quot; verk\u00fcrzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/preemptive-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-10T14:51:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T15:10:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/02\/Blog-Post-Preemptive-Intelligence-Pre-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"738\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen\",\"datePublished\":\"2026-02-10T14:51:58+00:00\",\"dateModified\":\"2026-02-10T15:10:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/\"},\"wordCount\":762,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Blog-Post-Preemptive-Intelligence-Pre-1.png\",\"keywords\":[\"OpenSSL\",\"Preemptive Intelligence\",\"Schwachstellenmanagement\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/\",\"name\":\"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Blog-Post-Preemptive-Intelligence-Pre-1.png\",\"datePublished\":\"2026-02-10T14:51:58+00:00\",\"dateModified\":\"2026-02-10T15:10:55+00:00\",\"description\":\"Wie Sie mit Preemptive Intelligence kritische Software sofort nach Bekanntmachung absichern und die \\\"Time-to-Action\\\" verk\u00fcrzen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Blog-Post-Preemptive-Intelligence-Pre-1.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Blog-Post-Preemptive-Intelligence-Pre-1.png\",\"width\":800,\"height\":738,\"caption\":\"KI verk\u00fcrzt die Zeit vom Exploit zum Angriff \u2013 Mit LocateRisk Preemptive Intelligence verk\u00fcrzen Sie Ihre Reaktionszeit.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/preemptive-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen - LocateRisk","description":"Wie Sie mit Preemptive Intelligence kritische Software sofort nach Bekanntmachung absichern und die \"Time-to-Action\" verk\u00fcrzen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/preemptive-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen - LocateRisk","og_description":"Wie Sie mit Preemptive Intelligence kritische Software sofort nach Bekanntmachung absichern und die \"Time-to-Action\" verk\u00fcrzen.","og_url":"https:\/\/locaterisk.com\/en\/preemptive-intelligence\/","og_site_name":"LocateRisk","article_published_time":"2026-02-10T14:51:58+00:00","article_modified_time":"2026-02-10T15:10:55+00:00","og_image":[{"width":800,"height":738,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/02\/Blog-Post-Preemptive-Intelligence-Pre-1.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen","datePublished":"2026-02-10T14:51:58+00:00","dateModified":"2026-02-10T15:10:55+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/"},"wordCount":762,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/02\/Blog-Post-Preemptive-Intelligence-Pre-1.png","keywords":["OpenSSL","Preemptive Intelligence","Schwachstellenmanagement"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/","url":"https:\/\/locaterisk.com\/preemptive-intelligence\/","name":"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/02\/Blog-Post-Preemptive-Intelligence-Pre-1.png","datePublished":"2026-02-10T14:51:58+00:00","dateModified":"2026-02-10T15:10:55+00:00","description":"Wie Sie mit Preemptive Intelligence kritische Software sofort nach Bekanntmachung absichern und die \"Time-to-Action\" verk\u00fcrzen.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/preemptive-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/02\/Blog-Post-Preemptive-Intelligence-Pre-1.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/02\/Blog-Post-Preemptive-Intelligence-Pre-1.png","width":800,"height":738,"caption":"KI verk\u00fcrzt die Zeit vom Exploit zum Angriff \u2013 Mit LocateRisk Preemptive Intelligence verk\u00fcrzen Sie Ihre Reaktionszeit."},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/preemptive-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Preemptive Intelligence \u00b7 Schwachstellen schneller schlie\u00dfen"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/7507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=7507"}],"version-history":[{"count":29,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/7507\/revisions"}],"predecessor-version":[{"id":7790,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/7507\/revisions\/7790"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/7535"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=7507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=7507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=7507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}