Social engineering attackers exploit trust and respect for authority
Blog

Phishing click into chaos or Never ever write to me again, dear Santa

Protect AIaaS from data leaks and legal risks with Microsoft Copilot
Blog

AI and Cybersecurity [Part 3]: Using AI-as-a-Service Safely in the Age of AI

Expose deepfakes and phishing with targeted awareness training from KnowBe4
Blog

Deepfake, a very dangerous attack tool

InfoGuard learner reported as one of the 30 best Swiss IT learners in the Silicon Valley IT Talent Programme
Blog

Our apprentice Dario in the “Silicon Valley IT Talent Programme”: What an adventure!

AI in network operation optimises and reduces resources
Blog

AIOps – How AI Optimises Network Operations

Leverage benefits of AI technology for Cyber security in accordance with ISO/IEC 42001:2023
Blog

AI and Cybersecurity [Part 2]: Digitalisation and Testing

XDR sharpens cyber defence and is indispensable for an efficient SOC
Blog

XDR – The Magic Word for Efficient Defence against Modern Cyber Attacks [Part 2]

Post-quantum cryptography is the key to future IT security
Blog

Crypto agility in the Post-quantum Era: The Key to the IT Security of the Future

How to break the cyber kill chain using InfoGuard and Akamai's five-point defence strategy
Blog

Ransomware Defence: Break the Cyber Kill Chain

Cyber security in accordance with the ISO/IEC 42001:2023 standard for commercial AI applications
Blog

AI and Cybersecurity [Part 1]: Fine-tuning between potential and risk

how xdr efficiently protects your endpoints from cyber threats - Part 1
Blog

XDR – The Magic Word for Efficient Defence against Modern Cyber Attacks [Part 1]

How well does your IT partner protect your business from cyberattacks
Blog

Is your IT partner ready for cyber defence? Take the test!

respond quickly to cyber incidents thanks to automated cyber defence
Blog

Automation as a Game-Changer for your Cyber Defence

BCMS is crucial to ensure business continuity
Blog

Ensuring business continuity: The central role of BCMS in crisis management

Proactive cyber SCRM to protect business continuity
Blog

CISO perspective: Proactive Cyber SCRM to protect your business continuity

illustrated guide for analysing dfir event logs with velociraptor
Blog

CSIRT Insights: Optimisation of Event Log Analysis and Recording in DFIR

Revised Swift CSCF v2024 with focus on third party risk management
Blog

Revised Swift CSCF v2024: Focus on Third-party risk Management

Blog

14th InfoGuard Security Lounge: what links cyber resilience, supply chains and AI

InfoGuard CSIrt Alert: kritische Sicherheitslücke in OpenSSH
Blog

[Alert] VUMA: RegreSSHion – Risk for exposed SSH Access

Infoguard Blog - Operational resilience through DORA-compliant cyber defence
Blog

Operational Resilience: Efficient and DORA-compliant Cyber Defence

InfoGuard_microsoft_365_cloud_asset security best practices
Blog

Sharpen up your M365 Cloud Security: 5 recommendations from practice

CRA gap assessment for compliance with Cyber Resilience Act
Blog

Cyber Resilience Act: Final Regulation is About to be Passed

Learn how to detect attackers on mobile devices and to secure smartphones and tablets.
Blog

Detecting Attackers on Smartphones and Tablets [Part 2]

Using analytics and automation to establish zero trust readiness
Blog

Putting Zero Trust 2.0 into Practice - in 5 Steps [Part 5: Analytics & Automation]

How a data protection incident reinforces the realisation that data protection is a must.
Blog

Identity protection – we can only protect what we're able to see

Prevention instead of Reaction. How a Compromise Assessment Protects your Data.
Blog

Prevention instead of Reaction: How a Compromise Assessment Protects your Data

How a data protection incident reinforces the realisation that data protection is a must.
Blog

Privacy alert: Lessons from a healthcare company's misstep

Leaked Credentials or how Black Basta attacker penetrate networks.
Blog

Leaked Credentials: How Black Basta attacker penetrate networks

Cyber Defence with Cortex XDR, in a dedicated SOC or as a managed SOC service.
Blog

Cyber Defence with Cortex XDR – in a dedicated SOC or as a managed SOC service

The clock is ticking: stricter NIS2 guidelines from October 2024, not just for CRITIS companies.
Blog

The clock is ticking: stricter NIS2 guidelines from October 2024

Mobile stalkerware on the rise: how to keep your devices secure? [PART 1]
Blog

Mobile stalkerware on the rise: how to keep your devices secure? [PART 1]

crypto agility puts it-architecture into spotlight
Blog

Crypto agility puts IT Architecture in the Spotlight

Zero trust readiness for secured data management
Blog

Putting Zero Trust 2.0 into Practice - in 5 Steps [Part 4: Data Security]

AI against cyber attacks, but not without human expertise
Blog

AI against cyber attacks – not without human expertise

Banks must fulfil further FINMA requirements. Infoguard summarises these in a checklist.
Blog

FINMA circular 2023/1 Operational Risks and Resilience – Ready for an audit?

Zero-trust-readiness for a secured IT-network
Blog

Putting Zero Trust 2.0 into Practice in Five Steps [Part 3: Networks]

infoguard-alert-cyber-security-ransomware-blog
Blog

AWS ransomware - and what's really behind it

Honeypots, how insecure is the internet (InfoGuard Cyber Security Blog)
Blog

Honeypots expose how insecure the internet is - and how SCION reduces the risk of attack

infoguard-blog-cyber-security-architectur-digest
Blog

The Architecture Digest 2023 – Insights from our day-to-day work

cyber-security-blog-innovation-day-2024-innovationen-trends-herausforderungen
Blog

CYBER SECURITY: INNOVATIONS, TRENDS AND CHALLENGES IN THE AGE OF ARTIFICIAL INTELLIGENCE

NIST gap assessment: vulnerability minimisation
Blog

Why a Gap Analysis is Crucial for Corporate Security

Putting Zero Trust 2.0 into Practice in Five Steps (InfoGuard Cyber Security Blog)
Blog

Putting Zero Trust 2.0 into Practice in Five Steps [Part 2: Identities]

Cyber security trends: review and outlook 2023/2024 (InfoGuard Cyber Security Blog)
Blog

Cyber Security Trends: Review of 2023 & Outlook for 2024

Advent story: Gingerbread targeted by hackers (InfoGuard Cyber Security Blog)
Blog

[Advent Story] A Sweet Temptation: Hackers Train their Sights on Gingerbread

Zero Trust: Putting it into practice in 5 steps 1 (InfoGuard Cyber Security Blog)
Blog

Putting Zero Trust 2.0 into Practice in Five Steps [Part 1: Device security]

InfoGuard CSIRT: (New) Volume Business: Fully Automated Scan and Reasonable Ransom Amount (InfoGuard Cyber Security Blog)
Blog

(New) Volume Business: Fully Automated Scan and Reasonable Ransom Amount

Crypto-Agility: What it means for the future and how to make your organisation crypto-agile. (InfoGuard Cyber Security Blog)
Blog

Crypto-Agility – Are You Ready for the Post-Quantum Era?

Vulnerability Management: How to avoid the 5 most common mistakes (InfoGuard Cyber Security Blog)
Blog

Vulnerability Management: the 5 Most Common Mistakes to Avoid

Netscaler vulnerability exploited by attacker group (InfoGuard Cyber Security Blog)
Blog

InfoGuard CSIRT Warning: Attacker Group Using Netscaler Vulnerability to Steal Credentials

Zero Trust: Maximum Security for OT Infrastructures (InfoGuard Cyber Security Blog)
Blog

Zero Trust: “Zero” Attack Surface and Maximum Security in OT Infrastructures

Integrated Management System for Information Security and Data Protection (InfoGuard Cyber Security Blog)
Blog

Integrated Management System for Information Security and Data Protection

Cyber Defence: Why NIS2 is a must (InfoGuard Cyber Security Blog)
Blog

NIS2 – Cyber Defence is a Must, not only for KRITIS

Security awareness requires both heart and mind (InfoGuard Cyber Security Blog)
Blog

Security awareness requires both heart and mind

Risk Management in Practice: Lessons from Diving for IT Security (Cyber Security Blog)
Blog

Risk Management in Practice: Lessons from Diving for IT Security

Zero Trust: Network Acess and Implementation (InfoGuard Cyber Security Blog)
Blog

Zero Trust Network Access – Implementing Zero Trust

Infoguard Cyber Security Blog: SWIFT change to v2023
Blog

SWIFT CSCF v2023 – New Changes for Enhanced Cyber Security

InfoGuard Cyber Security CRA: EU flag made of binary numbers
Blog

Cyber Resilience Act – Get Yourself and Your Products up to Speed for the CRA

InfoGuard Cyber Security Lounge: Welcome to the 13th Security Lounge at Casino Zug
Blog

Raising the Bar at the 13th InfoGuard Security Lounge – Impressions, Insights and Highlights

Cyber Security Awareness: Why cyber risk awareness is so important (InfoGuard Cyber Security Blog)
Blog

“Security Awareness, What’s the Point?”

Zero Trust: A Modern Security Model (InfoGuard Cyber Security Blog)
Blog

Zero Trust – “Perimeter Security” 2.0

Cyber incidents: The biggest business risk worldwide (InfoGuard Cyber Security Blog)
Blog

Cyber Incidents as the Biggest Business Risk – How Prevention Should Look Like

SIC5 – Instant Payment of banks (InfoGuard Cyber Security Blog)
Blog

SIC5 – What you need to know about banks’ “instant payments”

Malware camouflage: threat through manipulated command lines (InfoGuard Cyber Security Blog)
Blog

Malware Cloaking: the Growing Threat of Manipulated Command Lines

InfoGuard Cyber Security CTI Insights: Ransomware writing in the middle of binary numbers
Blog

Cyber Threat Intelligence Insights: Timing of Ransomware Incidents

The Information Security Act (ISG) and its revision: consequences and obligations with regard to cyber security
Blog

ISG revision: consequences & obligations for critical infrastructure operators [Part 2]

The Information Security Act (ISG) and its revision: consequences and obligations with regard to cyber security
Blog

ISG revision: consequences & obligations for critical infrastructure operators [Part 1]

Artificial Intelligence and Machine Learning: 6 Possible Applications of ChatGPT in Cyber Security and Cyber Defence
Blog

ChatGPT & Co. – the future of cyber security?

InfoGuard Cyber Security Blog: The seven mortal sins - how hackers can easily compromise networks
Blog

The seven mortal sins: how hackers can easily compromise networks

InfoGuard blog post: enhancing security through Cyber Threat Intelligence (CTI)
Blog

Enhancing security through Cyber Threat Intelligence – a review of the CTI year

infoguard-cyber-security-blog-three-lines-of-defence-en
Blog

From the “Three Lines of Defence” model to the “Three Lines Model”

cyber-security-blog-infoguard-architecture-digest-2022-en
Blog

The 2022 IT Security Architecture Digest

cyber-security-blog-innovation-day-2023-innovations-trends-challenges
Blog

Innovations, trends and challenges in cyber security – that was the 11th InfoGuard Innovation Day

infoguard-cyber-security-blog-iso-iec-270012022-en
Blog

ISO 27001:2022 – what has changed and what you need to get done

infoguard-csirt-alert-cyber-security-blog-malvertising
Blog

[Alert] InfoGuard CSIRT issues a “malvertising” warning

infoguard-cyber-security-blog-finma-circular-2023-1-operational-risks-and-resilience-banks
Blog

Are you ready for the new FINMA circular 2023/1 “Operational risks and resilience – Banks”?

infoguard-cyber-security-blog-rueckblick-2022-ausblick-2023-en
Blog

An exciting year for cyber security is both behind us and ahead of us

Blog

Advent, Advent, the school is “burning”! [Part 3]

infoguard-csirt-alert-cyber-security-blog-malware-raspberry-robin
Blog

[Alert] InfoGuard CSIRT issues a warning about infected flash drives

Blog

Advent, Advent, the school is “burning”! [Part 2]

infoguard-cyber-security-data-protection-law
Blog

Focus on data protection: The new Swiss data protection law and its consequences

infoguard-advent-the-school-is-burning-cyber-security
Blog

Advent, Advent, the school is “burning”! [Part 1]

infoguard-blog-dns-cyber-attacks
Blog

DNS on the front line in the defence against cyber-attacks

infoguard-understand-recognise-and-minimise-cyber-risks-in-supply-chains
Blog

Understanding, recognising and minimising supply chain cyber risk

infoguard-cyber-security-cloud-connection-iaas-saas
Blog

IaaS and SaaS: connection without any obstructions

infoguard-blog-cyber-attack-on-your-identitiy-provider-en
Blog

A cyber-attack on your identity provider – what you need to do now

infoguard-nis-2-eu-richtlinie-datenschutz
Blog

NIS 2 – an overview of the EU’s new Cyber Security Directive

infoguard-zugriffs-auf-authentisierungstokens-von-team-accounts-was-ist-dran
Blog

[Q&A] Access to authentication tokens from Teams accounts – What’s that all about?

infoguard-blog-eröffnung-cdc-en
Blog

Opening of the new InfoGuard Cyber Defence Center for your security – 24/7

Blog

Cyber defence demands expertise in cyber security, legal and risk transfer

Blog

How do I protect my Azure account?

Blog

InfoGuard CSIRT is warning of e-banking fraud

infoguard-cyber-security-business-continuity-management-bcm
Blog

Business Continuity Management (BCM) – being prepared starts with the mind

Blog

Why certain Swiss industrial companies are being hit by cyber-attacks

philippe-kaeppeli-cyber-security-blog-security-engineer-jobportrait
Blog

[Job portrait] What does a Security Engineer actually do?

infoguard-blog-cyber-resilience-part2-en
Blog

Cyber Resilience: CSIRT insights and emergency plan for top management

infoguard-blog-cyber-resilience-en
Blog

Dealing with cyber risks is a matter for the top management

infoguard-cyber-security-blog-security-lounge-2022
Blog

12. InfoGuard Security Lounge – the revival of the live event once again has surpassed all expectations

infoguard-luca-daniel-cyber-security-blog-en
Blog

My Berlin internship as an InfoGuard IT apprentice – Part 2

infoguard-luca-daniel-cyber-security-blog
Blog

Start-up vibes, doner kebabs and lots of sightseeing – my Berlin internship as an InfoGuard IT apprentice

infoguard-identity-centred-security-putting-it-into-practice-cyber-security-blog
Blog

“Identity-centred security – putting it into practice”

infoguard-cyber-security-evuma
Blog

External Vulnerability Management (eVUMA) – not optional, it’s a duty

infoguard-blog-aruba-networks-en
Blog

Improve security, performance and operational efficiency in the data centre

infoguard-blog-identities
Blog

Identities are central to digitalisation and security

infoguard-cyber-security-blog-ddos-rekordjahr-2022-en
Blog

Why a new record number of DDoS attacks are predicted in 2022

infoguard-blog-client-management-tanium-en
Blog

Client Management: faster, simpler and more efficient in 3 steps

infoguard-blog-cyber-culture
Blog

Cyber Security Culture – “Us and the Others” within the Organisation

infoguard-allianz-risk-barometer-2022
Blog

Cyber risks being ranked in first place in the Risk Barometer 2022 shows that they are still on the rise

infoguard-cyber-security-consultant-sebastiano-davanzo
Blog

[Job portrait] What does a Cyber Security Consultant actually do?

infoguard-cybersecurity-blog-valentinstag-2.0-en
Blog

Valentine's Day 2.0 - how to date online with security

infoguard-cyber-security-blog-cyber-attacks-are-making-headway
Blog

Cyber attacks are making headway – looking back and forward at cyber security

cyber-security-blog-innovation-day-2022-EN
Blog

In 2022, these cyber security issues will be keeping the it world on tenterhooks

infoguard-cyber-security-architecture-digest-2021
Blog

Architecture Digest 2021 – Particular concerns of our InfoGuard clients

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 3]

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]

infoguard-cyber-security-adventskalender
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 1]

infoguard-SAP-application-security-managed-service-erp-security
Blog

ERP security based on automation – the most efficient way to secure your SAP applications

infoguard-blog-isoiec27002:2021-en
Blog

ISO/IEC 27002:2022 – what you should know about the new changes

infoguard-blog-cloud-c52020-en
Blog

How C5:2020 helps you evaluate cloud providers

infoguard-stephan-berger-swiss-cyber-storm-2021-ransomware-part-2
Blog

Ransomware – a Latent Threat [Part 2]

infoguard-blog-ransomware-lateral-movement-en
Blog

Stopping Ransomware and Lateral-Movement thanks to Segmentation

infoguard-ransomware-stephan-berger-swiss-cyber-storm
Blog

Ransomware – a Latent Threat [Part 1]

infoguard-blog-azure-en
Blog

Dark clouds on the security horizon – Azure accounts compromised

infoguard-cyber-security-sase-secure-service-edge
Blog

Secure Access Service Edge (SASE) – The Future of Cloud Security

infoguard-blog-nozomi-en
Blog

Continuously assessing the risks that affect your OT and IoT systems

infoguard-cyber-security-blog-healthcare-en
Blog

What you need to be aware of when it comes to cyber security in the healthcare sector

infoguard-blog-privilegied-access-cloud-en
Blog

Privileged access to the Cloud – this is how to avoid damage

infoguard-blog-why-backup-strategy
Blog

Why it’s so important to have a solid back-up strategy

infoguard-swiss-data-protection-act-cyber-security-blog
Blog

The New Swiss Data Protection Act – The List of Processing Activities [Part 2]

Blog

Handle security incidents efficiently with Incident Response Triage

Blog

[INFOGUARD CSIRT WARNING] When the ransomware arrives via VPN

infoguard-blog-vectra-inside-threat-en
Blog

Inside Threat and what lies behind it

infoguard-blog-ot-security-safety
Blog

OT-Security, because it’s all about all of our safety and security

infoguard-blog-2fa-phishing-en
Blog

2-Factor-Phishing – the “Man-in-the-Middle” Attack

infoguard-blog-KI-cyberattacken-en
Blog

Fighting cyberattacks – AI both as a shield and a weapon

infoguard-cybersecurity-blog-5g-en
Blog

5G – yes, but... what about security?

infoguard-cyber-security-supply-chain-risk-management
Blog

A triangular relationship that comes with risks – Supply Chain Risk Management

infoguard-cyber-security-blog-securitylounge-2021-en
Blog

InfoGuard Security Lounge 2021 – Cyber Security Livestream

infoguard-cyber-security-blog-stalkerware
Blog

Stalkerware – when the smartphone turns into a bugging device

infoguard-blog-swiftcscfv2021-en
Blog

SWIFT CSCF v2021 – are you ready for the independent assessment?

infoguard-blog-devsecops-en
Blog

DevSecOps – how to make your DevOps Secure using Microgateways

infoguard-blog-airlock-zero-trust-en
Blog

Zero Trust and DevOps are revolutionising cyber security

infoguard-blog-risk-factor-byod-en
Blog

The BYOD risk factor – when business data goes mobile

infoguard-cyber-blog-vectra0365
Blog

Hackers and their target of choice – Microsoft 365 services

ig-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – keeping an eye on your cyber risks!

infoguard-blog-cortex-xdr-palo-alto-en
Blog

Fast, faster, XDR – how to speed up your detection & response!

infoguard-blog-cloud-iq-en
Blog

The artificial and human intelligence team – united against cyber threats

ig-blog-ransomware-parceltrick
Blog

[InfoGuard CSIRT Warning] Currently Ransomware Attacks are underway with the Parcel Trick

infoguard-cyber-security-swiss-data-protection-act
Blog

The new Swiss Data Protection Act – the most important new features [Part 1]

infoguard-blog-osterblog
Blog

The Easter Bunny as a Threat Actor – hunting for the tracks left behind

infoguard-blog-cyber-risk-management
Blog

Cyber Risk Management – how to keep your level of cyber risk under control!

microsoft-exchange-vulnerabilities–cleaning-tool-is-not-removing-all-footholds
Blog

Microsoft Exchange vulnerabilities – MS cleaning tool is not removing all adversaries footholds

infoguard-cyber-security-blog-ransomware-hacker
Blog

Ransomware attacks becoming more and more professional – and dangerous

infoguard-blog-online-education
Blog

Online Education – How Cyber Criminals Profit From It

infoguard-cyber-security-blog-fruehjahrsputz-it-sicherheitsarchitektur
Blog

The time is coming for a spring clean: has your IT architecture been collecting dust too?

infoguard-blog-informationssicherheit-im-öffentlichen-raum
Blog

Security of information in public areas – how do I protect myself against “shoulder surfing”?

infoguard-cyber-security-blog-home-office-working-from-home-monitoring-data-protection
Blog

Trust is good, but monitoring is better – monitoring and data protection when working from home

infoguard-blog-incident-response-en
Blog

[Video] A cyber thriller in 48 hours

infoguard-blog-incident-response
Blog

Incident response: the police are your friends and helpers

infoguard-cyber-security-sql-injection
Blog

SQL injection – how hackers break into internal databases

infoguard-cyber-security-blog-it-hygiene
Blog

Why in Cyber Security, Hygiene is the Be-All and End-All too

infoguard-blog-adobe-flash-player-en
Blog

The “End-of-Life” for Adobe Flash Player

infogaurd-blog-sophos-threat-report2021-en
Blog

A look forward into the Cyber Security New Year – Sophos Threat Report 2021

infoguard-blog-look-back-over-cyber-security-in-2020
Blog

A year of great change – our look back over cyber security in 2020

infoguard-cyber-crime-cyber-security-blog-news-2020
Blog

Cyber Crime & Cyber Security 2020 – what you may have missed in the news

infoguard-cyber-security-hacker-cyber-crime-advent-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 3]

infoguard-cyber-security-blog-cyber-crime-advent-story-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 2]

infoguard-cyber-security-crime-advent-story-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 1]

infoguard-blog-black-friday-en
Blog

Black Friday and Cyber Monday – two lucrative days for cyber criminals too

infoguard-blog-extreme-en
Blog

“One for all...” – this way you can control network and security with just one console!

infoguard-blog-protecting-web-and-cloud
Blog

Strengthen your defences – protecting the web and cloud is essential

infoguard-blog-backup-and-recovery
Blog

Why you should be treating your company data as if it were precious crown jewels

infoguard-cyber-security-blog-challenges-en
Blog

Vulnerable despite vulnerability management – these are the challenges you face

infoguard-blog-password-stealing-en
Blog

Password Stealing – how “safe” is my password

infoguard-cyber-security-blog-it-security-architect
Blog

The (non-) routine job of an IT security architect

infoguard-blog-two-factor-authentication
Blog

Two-factor authentication – feel the authentication flow

infoguard-blog-juniper-mist-en
Blog

Artificial intelligence – the time is ripe for the next generation of Wi-Fi

infoguard-cyber-security-blog-biometric-authentication
Blog

How to use biometric authentication and remain compliant with data protection regulations

infoguard-cyber-security-blog-dsg-2020
Blog

If you don't keep up with the times, time moves on without you – or replacing the Federal DSG

infoguard-blog-mastering-siem-projects-en
Blog

Mastering SIEM-projects succesfully – but how?

infoguard-cyber-security-blog-ttx-en
Blog

Table-Top-Exercises (TTX) – think about the worst-case scenario

infoguard-blog-psd2-en
Blog

PSD2 – what you should know about it and why it is a guarantee of security in “Open Banking”

infoguard-cyber-security-blog-soar-siem-en
Blog

SOAR and SIEM – so similar and yet so different

InfoGuard Incident Response
Blog

[Video] InfoGuard Incident Response − a real Ransomware attack on a Swiss customer

infoguard-cyber-security-blog-fleeceware-en
Blog

Beware of fleeceware – when “free” does not really mean free

infoguard-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – why you should be monitoring your cyber risks

infoguard-psychology–the-underrated-force-in-cyber-security
Blog

Psychology – the underrated force in cyber security

infoguard-blog-iso-iec27701-data-governance-en
Blog

ISO/IEC 27701 – the aspects of data protection that are integrated in the ISMS

infoguard-business-continuity-management-bcm-en
Blog

Business Continuity Management (BCM) – being prepared for global events

infoguard-cyber-security-qr-code-security-en
Blog

QR code – a little square that poses an underrated cyber risk

infoguard-iec-62443-ot-security-en
Blog

IEC 62443 – or how to implement OT security in an efficient and reliable way

infoguard-cyber-security-cloud-2-en
Blog

The secure way to the cloud [Part 2]

infoguard-cyber-security-blog-swift-v2020-en
Blog

SWIFT CSP v2020 – why you should never lose track of these controls

Infoguard-cyber-security-blog-vpn-is-dead-en
Blog

VPN is dead – long live remote access!

infoguard-cyber-security-blog-corona-lessons-en
Blog

“Coronavirus, the last” – cyber security lessons that have been learned from the crisis

infoguard-cyber-security-blog-security-or-trust
Blog

Security or trust – which one comes first?

infoguard-blog-juniper-atp-en
Blog

Why Advanced Threat Prevention is so important

infoguard-cyber-security-cloud-1-en
Blog

The way to the cloud is paved with a few pitfalls [Part 1]

infoguard-cyber-security-blog-social-media-phishing-en
Blog

Social Media Phishing – Phishing gets Social

infoguard-cyber-security-healthcare-corona-en
Blog

Healthcare in the context of viruses and co.

infoguard-cyber-security-ikt-minimalstandards-en
Blog

Efficiently Implementing and maintaining the ICT minimum standard

infoguard-cyber-security-blog-zero-trust-en
Blog

Zero Trust – take care in whom you trust

infoguard-cyber-security-blog-gcr-ikt-1-en
Blog

Governance, Risk & Compliance (GRC) – how to manage cyber risk while ensuring compliance!

infoguard-swift-cscf-assessment-en
Blog

SWIFT Customer Security Programme – are you ready for the upcoming assessment?

infoguard-cyber-security-easter-egg
Blog

“Easter egg” – the virtual Easter egg and its hidden back door

infoguard-cyber-security-blog-secure-home-office-2
Blog

[Part 2] Home office? Yes, but do it “securely” – incl. a checklist

infoguard-cyber-security-blog-home-office
Blog

Home office? Why not, but do it “securely” with these 5 tips

infoguard-cyber-security-coronavirus
Blog

Red alert ‒ the hacking trick with Coronavirus

36c3-ccc-infoguard-en
Blog

36C3 – something for everyone – from newbie hackers to dyed-in-the-wool nerds

infoguard-zero-trust-de
Blog

Zero trust is redefining cyber security

infoguard-CVE-2019-11184-en
Blog

CVE-2019-11184 – an Intel CPU vulnerability following 6 months of research

infoguard-cyber-security-ciso-tornado-en
Blog

CISOs in the eye of the storm due to a security incident

infoguard-cyber-security-blog-apprentices-career
Blog

[Interview] Young cyber security experts reveal what makes their training at InfoGuard unique

infoguard-cyber-security-ryuk-emotet-look-back-2019
Blog

The year of Emotet, Ryuk & co. – our look back over cyber security in 2019

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 4]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 3]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 2]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 1]

infoguard-cyber-security-threat-report-2020
Blog

A look into the cyber crystal ball – the Threat Report 2020

infoguard-zukunftstag-2019
Blog

Cyber security “young blood” in the starting blocks – National Future Day 2019

infoguard-cloud-penetration-testing
Blog

Cloud penetration testing – Find the holes in your cloud!

infoguard-marcelli-hackistanbul2019-3
Blog

Capture The Flag – InfoGuard steps on to the podium at HackIstanbul 2019

infoguard-cloud-security-office-365
Blog

How to use Office 365 securely in hybrid environments

infoguard-cyber-security-blog-data-loss-prevention-dlp
Blog

DLP – How to protect yourself in a pragmatic way against losing data

infoguard-cyber-security-blog-incident-response-video
Blog

[Video] Incident Response – the 5 most common mistakes

infoguard-cyber-security-blog-sap-security
Blog

SAP security ‒ security for standardised ERP software is possible [Part 2]

leonardo-genoni-infoguard-1
Blog

[Interview] Leonardo Genoni – A Shutout for Cyber Security

Blog

ERP ‒ the underestimated threat to your cyber security [Part 1]

infoguard-next-generation-web-application-security-waf
Blog

Disrupt or be disrupted – WAFs and digital transformation

infoguard-cyber-security-supply-chain-risk-management
Blog

How to build Cyber Supply Chain Risk Management

infoguard-cyber-security-container-microservices-severless
Blog

Container, Micro Services & Serverless Computing

infoguard-gloggner-philipp-esaf-2019-schwingen
Blog

Getting safely through the Swiss Wrestling and Alpine Festival 2019 with InfoGuard

infoguard-cyber-security-blog-microsoft-rdp
Blog

Microsoft RDP – Another serious security vulnerability

infoguard-cyber-security-operational-technology
Blog

OT Security ‒ How ICS & IACS infrastructures can be operated securely

infoguard-cyber-security-blog-emotet-trickbot-ryuk
Blog

Emotet, Trickbot and Ryuk – are these the worst threesome since computer viruses started?

phishing
Blog

Warning ‒ Targeted attacks on Swiss companies

infoguard-cyber-security-hybrid-multi-cloud
Blog

(Hybrid) cloud security – what you can learn from banks

infoguard-cyber-supply-chain-risk-management-sicherheit-lieferantenkette
Blog

Cyber Supply Chain Risk Management – Why security throughout the supply chain is so important

infoguard-security-lounge-26-06-2019-2
Blog

10 years of the InfoGuard Security Lounge – Cyber security meets passion!

infoguard-cyber-security-zero-trust-architektur
Blog

Zero trust in cyber security – trust no-one!

infoguard-fibre-assurance-monitoring-glasfaser
Blog

It is time to change how fibre optics are monitored

infoguard-cyber-security-datenschutzstrategie-data-privacy-strategy
Blog

Data privacy strategy – what about your data protection strategy?

infoguard-cyber-security-blog-reaktion-phishing
Blog

Phishing – why responsiveness is just as important as prevention

infoguard-cyber-security-whatsapp-sicherheitsluecke
Blog

WhatsApp, Mobile E-Banking & Co. – How to play it safe

infoguard-cyber-security-blog-it-architektur-teil-2
Blog

3 simple (but important) steps to enterprise IT security architecture

infoguard-cyber-security-blog-whaling
Blog

Whaling – don't fall into cyber criminals clutches

infoguard-cyber-security-blog-it-architektur-teil-1
Blog

How an enterprise IT security architecture makes digitisation easier

infoguard-cyber-security-blog-iot-botnets-open-source
Blog

IoT botnets – when Open Source is misused

infoguard-cyber-security-blog-emotet-dynamite-phishing
Blog

Dynamite Phishing ‒ Emotet can forge e-mails almost perfectly

infoguard-cyber-security-blog-threat-intelligence
Blog

"Patch everything, all the time" is out - today is Threat Intelligence

infoguard-cyber-security-blog-fileless-malware
Blog

The fileless malware myth

infoguard-tanium-edr-3
Blog

EDR: how to quickly respond and resolve security incidents

infoguard-blog-threat-intelligence
Blog

3 ways in which Threat Intelligence can help you to optimise your cyber security

Blog

Cyber security 2.0 - these 6 challenges await you in the future

Blog

Endpoint Detection & Response - the benefits of a proactive threat hunting approach

Blog

Switzerland - a dream for cyber security experts

Blog

Detect & Respond – one of the key Topics at The InfoGuard Innovation Day 2019

Blog

The new Terabit era - are you ready for DDoS?

Blog

[Video] EDR matters: How to reduce time-to-detect

Blog

Two-factor authentication - when double security is cut in half

Blog

35C3 – Moving sofas, intelligent light bulbs and government birds

Blog

When you can no longer see the fraud and the cyber attacks for the trees

Blog

365 Days of Cyber Security – what moved you in 2018!

Blog

Cyber Defence Center – Why "make" is not always a better solution than "buy"

Blog

Why your suppliers can pose a threat to you and why supplier risk management is so important

Blog

Incident response and digital forensics – or the securing of evidence in the digital environment

Blog

About robots, cops and robbers - Swiss National Future Day 2018

Blog

Endpoint Detection & Response – or why faster is better

Blog

Cyber security goes far beyond prevention

Blog

With the IoT, a global computer has been created – but how to keep it under control?

Blog

Opportunity breeds thieves – what hackers and burglars have in common...

Blog

2018 - The year of the GDPR (General Data Protection Regulation) is not over yet!

Blog

What Purple Teaming has in common with “cops and robbers”

Blog

How your Cyber Security can benefit from a home burglary

Blog

Shadow IT casts a (cloud) shadow over cyber security

Blog

User and Entity Behaviour Analytics to the rescue, if the attacker is already in the system

Blog

Vulnerability Management – Keeping Weaknesses under control

Blog

Alexa, are you listening? 6 tips for the Secure use of language assistants

Blog

All good things come in threes - WPA3 for greater Wi-Fi security

Blog

Network Access Control – your network’s brain

Blog

DDoS attacks under control? Not at all – this is just the tip of the iceberg

Blog

ISSS 2018 FinTech and Security – the world of finance within the digital revolution [Part 2]

Blog

ISSS 2018 FinTech and Security – the world of finance within the digital revolution [Part 1]

Blog

Containers challenge your vulnerability management

Blog

InfoGuard Security Lounge 2018 – the future starts today!

Blog

How the Industrial internet of things (IIoT) will revolutionise your business

Blog

Area 41 – When Zurich becomes Switzerland’s Mecca for hackers

Blog

This is what distinguishes a good cyber security expert [Part 2]

Blog

What open source intelligence has to do with cyber security

Blog

Recruiting, keeping and motivating cyber security experts [Part 1]

Blog

SOC 2.0 – or the miracle weapon against cyber threats

Blog

[Study] The future of apps, or how will your everyday life look like in year 2030

Blog

Cloud Access Security Broker – safely into the cloud with CASB

Blog

Blockchain Summit 2018 – what goes on in the CryptoValley Zug

Blog

Cyber Risk Management ‒ a risk turns into an opportunity

Blog

Blockchain – what do Bitcoins, hashes and smart contracts have to do with cyber security

Blog

GDPR: 1, 2 or 3 – the last chance is (soon) over

Blog

Bank robbery 2.0 – SWIFT cracks down with energy against cyber attacks

Blog

Cyber security will have a positive impact on the success of your enterprise – here is why

Blog

How can Gartner's Magic Quadrant help you with Intrusion Detection & Prevention

Blog

What a Wasp has to do with the OWASP Top 10 Risks of Web applications

Blog

Cyber revolution: In 2018, you must protect yourself against these 4 cyber risks

Blog

CISO & CIO take notice: these three cyber themes belong to your agenda in 2018

Blog

Social engineering emergency or how do hackers force their way into your mind

Blog

Cloud security – follow these 8 tips, so that your cloud doesn’t turn into a storm cloud

Blog

DNS Security – Do not let hackers in through the backdoor

Blog

Phishing – do not fall into the cyber criminals net

Blog

Looking back to the year past: what has stirred the cyber security world

Blog

Cyber security – how to reach the end of the day and stay secure

Blog

Wanted: cyber security experts – is your security threatened?

Blog

You too need a cyber security strategy ‒ here is why

Blog

Our 10-Step checklist will help you be prepared for the GDPR

Blog

As a Swiss bank, you need to be in control of your operational risks

Blog

Backstage at InfoGuard’s Cyber Defence Center

Blog

NIST cyber security framework – the five perspectives of cyber security

Blog

Machine Learning makes for a revolution in malware detection

Blog

What you missed at the DefCon 2017 – Part 2

Blog

Review of a visit to BSides and DefCon 2017 – Part 1

Blog

Look in the eyes of “digitisation's ugly sister”!

Blog

The 1001 tasks of a Chief Information Security Officer (CISO)

Blog

Our pentesters show how easy it is to hack IoT devices

Blog

Why the Internet of Things (IoT) is going to revolutionise security

Blog

IAM vs. CIAM: Why is classic IAM no longer enough

Blog

Red vs. blue ‒ why does the Cyber Defence Center set new standards

Blog

Be faster than your attacker – thanks to artificial intelligence!

Blog

Data Protection Officer – the specialist in data protection and GDPR

Blog

Cyber Defence Center – the SOC of the future

Blog

Chief Information Security Officer (CISO) ‒ an investment with ROI

Blog

How you can reduce privileged accounts and increase your security

Blog

6 good reasons for moving to a software-defined data centre model

Blog

Vulnerability management: no chance for hackers!

Blog

These six measures will make exploits disappear...

Blog

Getting IoT projects securely on track

Blog

Why the human factor is more important for it security than technology

Blog

The General Data Protection Regulation GDPR – no need to panic!

Blog

The features of a truly effective Cyber Security Strategy

Blog

The “Cyber Security Guide”: a master plan for maximum Cyber Security

Blog

The Swiss financial market as a target for cyber attacks