Expose deepfakes and phishing with targeted awareness training from KnowBe4
Blog

Deepfake, a very dangerous attack tool

AI in network operation optimises and reduces resources
Blog

AIOps – How AI Optimises Network Operations

How to break the cyber kill chain using InfoGuard and Akamai's five-point defence strategy
Blog

Ransomware Defence: Break the Cyber Kill Chain

Using analytics and automation to establish zero trust readiness
Blog

Putting Zero Trust 2.0 into Practice - in 5 Steps [Part 5: Analytics & Automation]

How a data protection incident reinforces the realisation that data protection is a must.
Blog

Identity protection – we can only protect what we're able to see

Zero trust readiness for secured data management
Blog

Putting Zero Trust 2.0 into Practice - in 5 Steps [Part 4: Data Security]

Zero-trust-readiness for a secured IT-network
Blog

Putting Zero Trust 2.0 into Practice in Five Steps [Part 3: Networks]

Zero Trust: Putting it into practice in 5 steps 1 (InfoGuard Cyber Security Blog)
Blog

Putting Zero Trust 2.0 into Practice in Five Steps [Part 1: Device security]

Vulnerability Management: How to avoid the 5 most common mistakes (InfoGuard Cyber Security Blog)
Blog

Vulnerability Management: the 5 Most Common Mistakes to Avoid

Zero Trust: Maximum Security for OT Infrastructures (InfoGuard Cyber Security Blog)
Blog

Zero Trust: “Zero” Attack Surface and Maximum Security in OT Infrastructures

Cyber Defence: Why NIS2 is a must (InfoGuard Cyber Security Blog)
Blog

NIS2 – Cyber Defence is a Must, not only for KRITIS

Zero Trust: Network Acess and Implementation (InfoGuard Cyber Security Blog)
Blog

Zero Trust Network Access – Implementing Zero Trust

Zero Trust: A Modern Security Model (InfoGuard Cyber Security Blog)
Blog

Zero Trust – “Perimeter Security” 2.0

SIC5 – Instant Payment of banks (InfoGuard Cyber Security Blog)
Blog

SIC5 – What you need to know about banks’ “instant payments”

infoguard-blog-dns-cyber-attacks
Blog

DNS on the front line in the defence against cyber-attacks

infoguard-nis-2-eu-richtlinie-datenschutz
Blog

NIS 2 – an overview of the EU’s new Cyber Security Directive

Blog

Cyber defence demands expertise in cyber security, legal and risk transfer

infoguard-cyber-security-blog-security-lounge-2022
Blog

12. InfoGuard Security Lounge – the revival of the live event once again has surpassed all expectations

infoguard-blog-aruba-networks-en
Blog

Improve security, performance and operational efficiency in the data centre

infoguard-blog-client-management-tanium-en
Blog

Client Management: faster, simpler and more efficient in 3 steps

infoguard-blog-isoiec27002:2021-en
Blog

ISO/IEC 27002:2022 – what you should know about the new changes

infoguard-blog-cloud-c52020-en
Blog

How C5:2020 helps you evaluate cloud providers

infoguard-blog-ransomware-lateral-movement-en
Blog

Stopping Ransomware and Lateral-Movement thanks to Segmentation

infoguard-cyber-security-blog-healthcare-en
Blog

What you need to be aware of when it comes to cyber security in the healthcare sector

infoguard-blog-ot-security-safety
Blog

OT-Security, because it’s all about all of our safety and security

infoguard-cybersecurity-blog-5g-en
Blog

5G – yes, but... what about security?

infoguard-blog-devsecops-en
Blog

DevSecOps – how to make your DevOps Secure using Microgateways

infoguard-blog-airlock-zero-trust-en
Blog

Zero Trust and DevOps are revolutionising cyber security

ig-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – keeping an eye on your cyber risks!

infoguard-blog-cortex-xdr-palo-alto-en
Blog

Fast, faster, XDR – how to speed up your detection & response!

infoguard-blog-cloud-iq-en
Blog

The artificial and human intelligence team – united against cyber threats

infoguard-blog-cyber-risk-management
Blog

Cyber Risk Management – how to keep your level of cyber risk under control!

infoguard-blog-extreme-en
Blog

“One for all...” – this way you can control network and security with just one console!

infoguard-cyber-security-blog-biometric-authentication
Blog

How to use biometric authentication and remain compliant with data protection regulations

infoguard-cyber-security-blog-ttx-en
Blog

Table-Top-Exercises (TTX) – think about the worst-case scenario

infoguard-cyber-security-blog-soar-siem-en
Blog

SOAR and SIEM – so similar and yet so different

InfoGuard Incident Response
Blog

[Video] InfoGuard Incident Response − a real Ransomware attack on a Swiss customer

infoguard-iec-62443-ot-security-en
Blog

IEC 62443 – or how to implement OT security in an efficient and reliable way

Infoguard-cyber-security-blog-vpn-is-dead-en
Blog

VPN is dead – long live remote access!

infoguard-cyber-security-healthcare-corona-en
Blog

Healthcare in the context of viruses and co.

infoguard-zero-trust-de
Blog

Zero trust is redefining cyber security

infoguard-cyber-security-ciso-tornado-en
Blog

CISOs in the eye of the storm due to a security incident

infoguard-cyber-security-blog-data-loss-prevention-dlp
Blog

DLP – How to protect yourself in a pragmatic way against losing data

leonardo-genoni-infoguard-1
Blog

[Interview] Leonardo Genoni – A Shutout for Cyber Security

infoguard-cyber-security-supply-chain-risk-management
Blog

How to build Cyber Supply Chain Risk Management

infoguard-gloggner-philipp-esaf-2019-schwingen
Blog

Getting safely through the Swiss Wrestling and Alpine Festival 2019 with InfoGuard

infoguard-cyber-security-operational-technology
Blog

OT Security ‒ How ICS & IACS infrastructures can be operated securely

infoguard-cyber-security-hybrid-multi-cloud
Blog

(Hybrid) cloud security – what you can learn from banks

infoguard-cyber-supply-chain-risk-management-sicherheit-lieferantenkette
Blog

Cyber Supply Chain Risk Management – Why security throughout the supply chain is so important

infoguard-security-lounge-26-06-2019-2
Blog

10 years of the InfoGuard Security Lounge – Cyber security meets passion!

infoguard-fibre-assurance-monitoring-glasfaser
Blog

It is time to change how fibre optics are monitored

infoguard-cyber-security-datenschutzstrategie-data-privacy-strategy
Blog

Data privacy strategy – what about your data protection strategy?

Blog

Detect & Respond – one of the key Topics at The InfoGuard Innovation Day 2019

Blog

Two-factor authentication - when double security is cut in half

Blog

365 Days of Cyber Security – what moved you in 2018!

Blog

Cyber Defence Center – Why "make" is not always a better solution than "buy"

Blog

Incident response and digital forensics – or the securing of evidence in the digital environment

Blog

Endpoint Detection & Response – or why faster is better

Blog

Cyber security goes far beyond prevention

Blog

With the IoT, a global computer has been created – but how to keep it under control?

Blog

Opportunity breeds thieves – what hackers and burglars have in common...

Blog

Containers challenge your vulnerability management

Blog

InfoGuard Security Lounge 2018 – the future starts today!

Blog

GDPR: 1, 2 or 3 – the last chance is (soon) over

Blog

Looking back to the year past: what has stirred the cyber security world

Blog

Machine Learning makes for a revolution in malware detection

Blog

Why the Internet of Things (IoT) is going to revolutionise security

Blog

How you can reduce privileged accounts and increase your security

Blog

6 good reasons for moving to a software-defined data centre model

Blog

These six measures will make exploits disappear...

Blog

Why the human factor is more important for it security than technology

Blog

The features of a truly effective Cyber Security Strategy

Blog

The “Cyber Security Guide”: a master plan for maximum Cyber Security