{"id":352,"date":"2025-06-16T09:18:31","date_gmt":"2025-06-16T09:18:31","guid":{"rendered":"https:\/\/kiberklaszter.hu\/?page_id=352"},"modified":"2025-07-15T10:58:24","modified_gmt":"2025-07-15T10:58:24","slug":"hirek","status":"publish","type":"page","link":"https:\/\/kiberklaszter.hu\/en\/hirek\/","title":{"rendered":"News"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"352\" class=\"elementor elementor-352\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-458a480 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"458a480\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-522f85c\" data-id=\"522f85c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2ae41e7 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ae41e7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8266f5f\" data-id=\"8266f5f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0a32b5 elementor-section-content-middle elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"f0a32b5\" data-element_type=\"section\" data-settings=\"{&quot;shape_divider_top&quot;:&quot;curve-asymmetrical&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,0c0,0,0,6,0,6.7c0,18,240.2,93.6,615.2,92.6C989.8,98.5,1000,25,1000,6.7c0-0.7,0-6.7,0-6.7H0z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f59305\" data-id=\"6f59305\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-93f8c93 e-flex e-con-boxed e-con e-parent\" data-id=\"93f8c93\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5de9586 elementor-widget elementor-widget-spacer\" data-id=\"5de9586\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8db4bd3 e-flex e-con-boxed e-con e-parent\" data-id=\"8db4bd3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-838f5b7 elementor-widget elementor-widget-tfposts\" data-id=\"838f5b7\" data-element_type=\"widget\" data-widget_type=\"tfposts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div id=\"tf-posts-838f5b7\" class=\"tf-posts-838f5b7 tf-posts-wrap     no-arrow no-bullets  featured-post-\" data-tabid=\"838f5b7\" data-class_id=\"tf-posts-838f5b7\" data-loop=\"\" data-auto=\"\" data-column=\"\" data-column2=\"\" data-column3=\"\" data-spacer=\"\" data-prev_icon=\"\" data-next_icon=\"\" >\t\t\t\r\n\t\t\t<div class=\"tf-posts  list\">\r\n\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<div class=\"column\">\r\n\t\t\t\t\t<div class=\"entry blog-post\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"featured-post\">\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/kiberklaszter.hu\/wp-content\/uploads\/2026\/03\/1774444291326.jpg\" alt=\"image\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/03\/26\/mi-a-kiberbiztonsagi-auditban-kutatas-fejlesztesi-projekt-megnyito\/\" class=\"overlay\">\r\n\t\t\t\t\t\t\t\t\t\t<i class=\"\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"title\"><a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/03\/26\/mi-a-kiberbiztonsagi-auditban-kutatas-fejlesztesi-projekt-megnyito\/\" title=\"AI in cybersecurity auditing: Research and development project opening\">AI in cybersecurity auditing: Research and development project opening<\/a><\/h2>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"post-meta\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"post-date\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/03\/26\/\">2026-03-26<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-post\">Alverad Technology Focus Kft. cordially invites cluster members and all interested professionals to the presentation of its latest research and development project, which supports cybersecurity audits and compliance processes with an artificial intelligence-based solution.\u2026<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"tf-button-container\">\r\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/03\/26\/mi-a-kiberbiztonsagi-auditban-kutatas-fejlesztesi-projekt-megnyito\/\" class=\"tf-button bt_icon_after\">\r\n\t\t\t\t\t\t\t\t\t\t\tI will read it.<i class=\"fas fa-angle-double-right\" aria-hidden=\"true\"><\/i> \r\n\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"column\">\r\n\t\t\t\t\t<div class=\"entry blog-post\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"featured-post\">\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/kiberklaszter.hu\/wp-content\/uploads\/2026\/02\/Kepernyofoto-2026-02-10-9.53.34-1024x629.png\" alt=\"image\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/10\/megvalosult-a-magyar-kiberbiztonsagi-klaszter-nis2-workshopja-audit-allo-nis2-megfeleles-a-gyakorlatban-cimmel\/\" class=\"overlay\">\r\n\t\t\t\t\t\t\t\t\t\t<i class=\"\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"title\"><a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/10\/megvalosult-a-magyar-kiberbiztonsagi-klaszter-nis2-workshopja-audit-allo-nis2-megfeleles-a-gyakorlatban-cimmel\/\" title=\"The Hungarian Cybersecurity Cluster&#039;s NIS2 workshop titled &quot;Audit-proof NIS2: compliance in practice&quot; was held.\">The Hungarian Cybersecurity Cluster&#039;s NIS2 workshop titled &quot;Audit-proof NIS2: compliance in practice&quot; was held.<\/a><\/h2>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"post-meta\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"post-date\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/10\/\">2026-02-10<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-post\">The Hungarian Cybersecurity Cluster and the Software Industry Innovation Pole Cluster jointly organized a professional workshop at \u00d3buda University on the practical challenges of NIS2 regulation. NIS2 is the EU&#039;s new minimum cybersecurity system,\u2026<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"tf-button-container\">\r\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/10\/megvalosult-a-magyar-kiberbiztonsagi-klaszter-nis2-workshopja-audit-allo-nis2-megfeleles-a-gyakorlatban-cimmel\/\" class=\"tf-button bt_icon_after\">\r\n\t\t\t\t\t\t\t\t\t\t\tI will read it.<i class=\"fas fa-angle-double-right\" aria-hidden=\"true\"><\/i> \r\n\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"column\">\r\n\t\t\t\t\t<div class=\"entry blog-post\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"featured-post\">\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/kiberklaszter.hu\/wp-content\/uploads\/2026\/02\/Blue-Modern-Cyber-Security-Company-Instagram-Post-1024x576.png\" alt=\"image\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/06\/gyakorlati-nis2-auditok-szakmai-esemeny-februarban\/\" class=\"overlay\">\r\n\t\t\t\t\t\t\t\t\t\t<i class=\"\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"title\"><a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/06\/gyakorlati-nis2-auditok-szakmai-esemeny-februarban\/\" title=\"Practical NIS2 audits \u2013 professional event in February\">Practical NIS2 audits \u2013 professional event in February<\/a><\/h2>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"post-meta\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"post-date\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/06\/\">2026-02-06<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-post\">Alverad Kft. and NIK are organizing a joint NIS2 working group event on February 12, 2026, which will focus on practical issues of NIS2 audits. The aim of the event is to provide participants with a comprehensive overview\u2026<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"tf-button-container\">\r\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/06\/gyakorlati-nis2-auditok-szakmai-esemeny-februarban\/\" class=\"tf-button bt_icon_after\">\r\n\t\t\t\t\t\t\t\t\t\t\tI will read it.<i class=\"fas fa-angle-double-right\" aria-hidden=\"true\"><\/i> \r\n\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"column\">\r\n\t\t\t\t\t<div class=\"entry blog-post\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"featured-post\">\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/kiberklaszter.hu\/wp-content\/uploads\/2026\/02\/andrews_logo_1600x600px-1024x384-1.png\" alt=\"image\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/04\/tenyleg-kikerulhetnek-cegek-a-kiberbiztonsagi-torveny-hatalya-alol\/\" class=\"overlay\">\r\n\t\t\t\t\t\t\t\t\t\t<i class=\"\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"title\"><a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/04\/tenyleg-kikerulhetnek-cegek-a-kiberbiztonsagi-torveny-hatalya-alol\/\" title=\"Can companies really escape the scope of the Cybersecurity Act?\">Can companies really escape the scope of the Cybersecurity Act?<\/a><\/h2>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"post-meta\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"post-date\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/04\/\">2026-02-04<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-post\">Recently, several news items and professional opinions have appeared stating that the scope of organizations covered by the Cybersecurity Act may change as a result of the amendment to Act CXXXV of 2025. Many have raised the issue\u2026<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"tf-button-container\">\r\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/02\/04\/tenyleg-kikerulhetnek-cegek-a-kiberbiztonsagi-torveny-hatalya-alol\/\" class=\"tf-button bt_icon_after\">\r\n\t\t\t\t\t\t\t\t\t\t\tI will read it.<i class=\"fas fa-angle-double-right\" aria-hidden=\"true\"><\/i> \r\n\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"column\">\r\n\t\t\t\t\t<div class=\"entry blog-post\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"featured-post\">\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/kiberklaszter.hu\/wp-content\/uploads\/2026\/01\/tengrai_image_1769081229_8903816.jpg\" alt=\"image\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/01\/22\/az-informatikai-felsooktatas-uj-kihivasai-a-mesterseges-intelligencia-korszakaban\/\" class=\"overlay\">\r\n\t\t\t\t\t\t\t\t\t\t<i class=\"\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"title\"><a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/01\/22\/az-informatikai-felsooktatas-uj-kihivasai-a-mesterseges-intelligencia-korszakaban\/\" title=\"New challenges for IT higher education in the era of artificial intelligence\">New challenges for IT higher education in the era of artificial intelligence<\/a><\/h2>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"post-meta\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"post-date\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/01\/22\/\">2026-01-22<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-post\">The rapid rise of artificial intelligence is fundamentally transforming the IT profession and related higher education programs. Gy\u00f6rgy Eigner, Dean of the John von Neumann Faculty of Informatics at \u00d3buda University, said in a recent interview\u2026<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"tf-button-container\">\r\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kiberklaszter.hu\/en\/2026\/01\/22\/az-informatikai-felsooktatas-uj-kihivasai-a-mesterseges-intelligencia-korszakaban\/\" class=\"tf-button bt_icon_after\">\r\n\t\t\t\t\t\t\t\t\t\t\tI will read it.<i class=\"fas fa-angle-double-right\" aria-hidden=\"true\"><\/i> \r\n\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\t\t<nav class=\"navigation navigation-numeric-link\" role=\"navigation\">\r\n\t\t\t\t<div class=\"pagination loop-pagination left\">\r\n\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/pages\/352\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/pages\/352\/page\/3\/\">3<\/a>\n<span class=\"page-numbers dots\">\u2026<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/pages\/352\/page\/8\/\">8<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/pages\/352\/page\/2\/\"><i class=\"fas fa-angle-right\"><\/i><\/a>\t\t\t\t<\/div>\r\n\t\t\t<\/nav>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37f5215 e-flex e-con-boxed e-con e-parent\" data-id=\"37f5215\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9186e7 elementor-widget elementor-widget-tf-scroll-top\" data-id=\"a9186e7\" data-element_type=\"widget\" data-widget_type=\"tf-scroll-top.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div id=\"tf-scroll-top\" class=\"tf-scroll-top scroll-and-show scroll-top-position-right from-bottom\" data-tabid=\"a9186e7\" data-type=\"scroll-and-show\">\r\n\t\t\t<a href=\"#\" class=\"inner-scroll-top\">\r\n\t\t\t\t<span class=\"icon-scroll-top\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\r\n\t\t\t<\/a>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>New opportunities for digital security \u2013 the Hungarian Cybersecurity Cluster has joined the John Neumann Computer Science Society (NJSZT)! 2025-07-14 We are pleased to announce that the Hungarian Cybersecurity Cluster has joined the John Neumann Computer Science Society (NJSZT)! About the Neumann Society The John Neumann Computer Science Society is the largest Hungarian IT organization with the longest history.\u2026 Read Four new members have joined the Hungarian [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"%%post_title%% %%sep%% %%sitetitle%%","_seopress_titles_desc":"Friss h\u00edrek a Magyar Kiberbiztons\u00e1gi Klaszter esem\u00e9nyeir\u0151l, nemzetk\u00f6zi megjelen\u00e9sekr\u0151l, szakmai workshopokr\u00f3l \u00e9s klaszterb\u0151v\u00fcl\u00e9sekr\u0151l. Tekintse meg leg\u00fajabb bejegyz\u00e9seinket!","_seopress_robots_index":"","footnotes":""},"class_list":["post-352","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/pages\/352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/comments?post=352"}],"version-history":[{"count":32,"href":"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/pages\/352\/revisions"}],"predecessor-version":[{"id":1009,"href":"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/pages\/352\/revisions\/1009"}],"wp:attachment":[{"href":"https:\/\/kiberklaszter.hu\/en\/wp-json\/wp\/v2\/media?parent=352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}