Successful InfoGuard Innovation Day 2025 with lots of cyber security news
Blog

Innovations, trends and challenges in cyber security – that was the 13th InfoGuard Innovation Day

Social engineering attackers exploit trust and respect for authority
Blog

Phishing click into chaos or Never ever write to me again, dear Santa

XDR sharpens cyber defence and is indispensable for an efficient SOC
Blog

XDR – The Magic Word for Efficient Defence against Modern Cyber Attacks [Part 2]

How to break the cyber kill chain using InfoGuard and Akamai's five-point defence strategy
Blog

Ransomware Defence: Break the Cyber Kill Chain

how xdr efficiently protects your endpoints from cyber threats - Part 1
Blog

XDR – The Magic Word for Efficient Defence against Modern Cyber Attacks [Part 1]

Cyber Defence with Cortex XDR, in a dedicated SOC or as a managed SOC service.
Blog

Cyber Defence with Cortex XDR – in a dedicated SOC or as a managed SOC service

AI against cyber attacks, but not without human expertise
Blog

AI against cyber attacks – not without human expertise

cyber-security-blog-innovation-day-2024-innovationen-trends-herausforderungen
Blog

CYBER SECURITY: INNOVATIONS, TRENDS AND CHALLENGES IN THE AGE OF ARTIFICIAL INTELLIGENCE

Vulnerability Management: How to avoid the 5 most common mistakes (InfoGuard Cyber Security Blog)
Blog

Vulnerability Management: the 5 Most Common Mistakes to Avoid

Cyber incidents: The biggest business risk worldwide (InfoGuard Cyber Security Blog)
Blog

Cyber Incidents as the Biggest Business Risk – How Prevention Should Look Like

cyber-security-blog-innovation-day-2023-innovations-trends-challenges
Blog

Innovations, trends and challenges in cyber security – that was the 11th InfoGuard Innovation Day

infoguard-cyber-security-blog-rueckblick-2022-ausblick-2023-en
Blog

An exciting year for cyber security is both behind us and ahead of us

infoguard-blog-cyber-attack-on-your-identitiy-provider-en
Blog

A cyber-attack on your identity provider – what you need to do now

Blog

Cyber defence demands expertise in cyber security, legal and risk transfer

Blog

How do I protect my Azure account?

Blog

InfoGuard CSIRT is warning of e-banking fraud

Blog

Why certain Swiss industrial companies are being hit by cyber-attacks

infoguard-blog-cyber-resilience-en
Blog

Dealing with cyber risks is a matter for the top management

infoguard-allianz-risk-barometer-2022
Blog

Cyber risks being ranked in first place in the Risk Barometer 2022 shows that they are still on the rise

infoguard-cyber-security-blog-cyber-attacks-are-making-headway
Blog

Cyber attacks are making headway – looking back and forward at cyber security

cyber-security-blog-innovation-day-2022-EN
Blog

In 2022, these cyber security issues will be keeping the it world on tenterhooks

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]

infoguard-blog-ransomware-lateral-movement-en
Blog

Stopping Ransomware and Lateral-Movement thanks to Segmentation

infoguard-blog-azure-en
Blog

Dark clouds on the security horizon – Azure accounts compromised

Blog

[INFOGUARD CSIRT WARNING] When the ransomware arrives via VPN

infoguard-blog-vectra-inside-threat-en
Blog

Inside Threat and what lies behind it

infoguard-cyber-security-blog-securitylounge-2021-en
Blog

InfoGuard Security Lounge 2021 – Cyber Security Livestream

ig-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – keeping an eye on your cyber risks!

infoguard-blog-cortex-xdr-palo-alto-en
Blog

Fast, faster, XDR – how to speed up your detection & response!

ig-blog-ransomware-parceltrick
Blog

[InfoGuard CSIRT Warning] Currently Ransomware Attacks are underway with the Parcel Trick

infoguard-blog-cyber-risk-management
Blog

Cyber Risk Management – how to keep your level of cyber risk under control!

Methods to detect webshells with infoguard
Blog

Microsoft Exchange vulnerabilities – MS cleaning tool is not removing all adversaries footholds

infoguard-blog-incident-response
Blog

Incident response: the police are your friends and helpers

infoguard-cyber-security-sql-injection
Blog

SQL injection – how hackers break into internal databases

infoguard-blog-look-back-over-cyber-security-in-2020
Blog

A year of great change – our look back over cyber security in 2020

infoguard-cyber-security-blog-challenges-en
Blog

Vulnerable despite vulnerability management – these are the challenges you face

infoguard-blog-mastering-siem-projects-en
Blog

Mastering SIEM-projects succesfully – but how?

infoguard-cyber-security-blog-soar-siem-en
Blog

SOAR and SIEM – so similar and yet so different

InfoGuard Incident Response
Blog

[Video] InfoGuard Incident Response − a real Ransomware attack on a Swiss customer

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 4]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 3]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 2]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 1]

leonardo-genoni-infoguard-1
Blog

[Interview] Leonardo Genoni – A Shutout for Cyber Security

infoguard-gloggner-philipp-esaf-2019-schwingen
Blog

Getting safely through the Swiss Wrestling and Alpine Festival 2019 with InfoGuard

infoguard-tanium-edr-3
Blog

EDR: how to quickly respond and resolve security incidents

infoguard-blog-threat-intelligence
Blog

3 ways in which Threat Intelligence can help you to optimise your cyber security

Blog

Endpoint Detection & Response - the benefits of a proactive threat hunting approach

Blog

Detect & Respond – one of the key Topics at The InfoGuard Innovation Day 2019

Blog

[Video] EDR matters: How to reduce time-to-detect

Blog

When you can no longer see the fraud and the cyber attacks for the trees

Blog

Cyber Defence Center – Why "make" is not always a better solution than "buy"

Blog

Incident response and digital forensics – or the securing of evidence in the digital environment

Blog

Endpoint Detection & Response – or why faster is better

Blog

Cyber security goes far beyond prevention

Blog

Opportunity breeds thieves – what hackers and burglars have in common...

Blog

What Purple Teaming has in common with “cops and robbers”

Blog

How your Cyber Security can benefit from a home burglary

Blog

User and Entity Behaviour Analytics to the rescue, if the attacker is already in the system

Blog

Vulnerability Management – Keeping Weaknesses under control

Blog

SOC 2.0 – or the miracle weapon against cyber threats

Blog

How can Gartner's Magic Quadrant help you with Intrusion Detection & Prevention

Blog

Backstage at InfoGuard’s Cyber Defence Center

Blog

Machine Learning makes for a revolution in malware detection

Blog

Red vs. blue ‒ why does the Cyber Defence Center set new standards

Blog

Be faster than your attacker – thanks to artificial intelligence!

Blog

Cyber Defence Center – the SOC of the future

Blog

Chief Information Security Officer (CISO) ‒ an investment with ROI

Blog

Vulnerability management: no chance for hackers!

Blog

The Swiss financial market as a target for cyber attacks