Post-quantum cryptography is the key to future IT security
Blog

Crypto agility in the Post-quantum Era: The Key to the IT Security of the Future

crypto agility puts it-architecture into spotlight
Blog

Crypto agility puts IT Architecture in the Spotlight

infoguard-blog-cyber-security-architectur-digest
Blog

The Architecture Digest 2023 – Insights from our day-to-day work

cyber-security-blog-infoguard-architecture-digest-2022-en
Blog

The 2022 IT Security Architecture Digest

infoguard-understand-recognise-and-minimise-cyber-risks-in-supply-chains
Blog

Understanding, recognising and minimising supply chain cyber risk

infoguard-cyber-security-cloud-connection-iaas-saas
Blog

IaaS and SaaS: connection without any obstructions

infoguard-cyber-security-business-continuity-management-bcm
Blog

Business Continuity Management (BCM) – being prepared starts with the mind

infoguard-blog-identities
Blog

Identities are central to digitalisation and security

infoguard-blog-client-management-tanium-en
Blog

Client Management: faster, simpler and more efficient in 3 steps

infoguard-cyber-security-architecture-digest-2021
Blog

Architecture Digest 2021 – Particular concerns of our InfoGuard clients

infoguard-SAP-application-security-managed-service-erp-security
Blog

ERP security based on automation – the most efficient way to secure your SAP applications

infoguard-blog-why-backup-strategy
Blog

Why it’s so important to have a solid back-up strategy

infoguard-blog-cyber-risk-management
Blog

Cyber Risk Management – how to keep your level of cyber risk under control!

infoguard-cyber-security-blog-fruehjahrsputz-it-sicherheitsarchitektur
Blog

The time is coming for a spring clean: has your IT architecture been collecting dust too?

infoguard-cyber-security-blog-it-hygiene
Blog

Why in Cyber Security, Hygiene is the Be-All and End-All too

infoguard-cyber-security-blog-it-security-architect
Blog

The (non-) routine job of an IT security architect

infoguard-business-continuity-management-bcm-en
Blog

Business Continuity Management (BCM) – being prepared for global events

infoguard-cyber-security-blog-sap-security
Blog

SAP security ‒ security for standardised ERP software is possible [Part 2]

Blog

ERP ‒ the underestimated threat to your cyber security [Part 1]

infoguard-cyber-security-container-microservices-severless
Blog

Container, Micro Services & Serverless Computing

infoguard-cyber-supply-chain-risk-management-sicherheit-lieferantenkette
Blog

Cyber Supply Chain Risk Management – Why security throughout the supply chain is so important

infoguard-cyber-security-blog-it-architektur-teil-2
Blog

3 simple (but important) steps to enterprise IT security architecture

infoguard-cyber-security-blog-it-architektur-teil-1
Blog

How an enterprise IT security architecture makes digitisation easier

Blog

Two-factor authentication - when double security is cut in half