Protect AIaaS from data leaks and legal risks with Microsoft Copilot
Blog

AI and Cybersecurity [Part 3]: Using AI-as-a-Service Safely in the Age of AI

Leverage benefits of AI technology for Cyber security in accordance with ISO/IEC 42001:2023
Blog

AI and Cybersecurity [Part 2]: Digitalisation and Testing

How to break the cyber kill chain using InfoGuard and Akamai's five-point defence strategy
Blog

Ransomware Defence: Break the Cyber Kill Chain

Cyber security in accordance with the ISO/IEC 42001:2023 standard for commercial AI applications
Blog

AI and Cybersecurity [Part 1]: Fine-tuning between potential and risk

How well does your IT partner protect your business from cyberattacks
Blog

Is your IT partner ready for cyber defence? Take the test!

BCMS is crucial to ensure business continuity
Blog

Ensuring business continuity: The central role of BCMS in crisis management

Proactive cyber SCRM to protect business continuity
Blog

CISO perspective: Proactive Cyber SCRM to protect your business continuity

Blog

14th InfoGuard Security Lounge: what links cyber resilience, supply chains and AI

AI against cyber attacks, but not without human expertise
Blog

AI against cyber attacks – not without human expertise

cyber-security-blog-innovation-day-2024-innovationen-trends-herausforderungen
Blog

CYBER SECURITY: INNOVATIONS, TRENDS AND CHALLENGES IN THE AGE OF ARTIFICIAL INTELLIGENCE

NIST gap assessment: vulnerability minimisation
Blog

Why a Gap Analysis is Crucial for Corporate Security

Advent story: Gingerbread targeted by hackers (InfoGuard Cyber Security Blog)
Blog

[Advent Story] A Sweet Temptation: Hackers Train their Sights on Gingerbread

Crypto-Agility: What it means for the future and how to make your organisation crypto-agile. (InfoGuard Cyber Security Blog)
Blog

Crypto-Agility – Are You Ready for the Post-Quantum Era?

Netscaler vulnerability exploited by attacker group (InfoGuard Cyber Security Blog)
Blog

InfoGuard CSIRT Warning: Attacker Group Using Netscaler Vulnerability to Steal Credentials

Zero Trust: Network Acess and Implementation (InfoGuard Cyber Security Blog)
Blog

Zero Trust Network Access – Implementing Zero Trust

InfoGuard Cyber Security Lounge: Welcome to the 13th Security Lounge at Casino Zug
Blog

Raising the Bar at the 13th InfoGuard Security Lounge – Impressions, Insights and Highlights

Zero Trust: A Modern Security Model (InfoGuard Cyber Security Blog)
Blog

Zero Trust – “Perimeter Security” 2.0

InfoGuard Cyber Security CTI Insights: Ransomware writing in the middle of binary numbers
Blog

Cyber Threat Intelligence Insights: Timing of Ransomware Incidents

Artificial Intelligence and Machine Learning: 6 Possible Applications of ChatGPT in Cyber Security and Cyber Defence
Blog

ChatGPT & Co. – the future of cyber security?

InfoGuard blog post: enhancing security through Cyber Threat Intelligence (CTI)
Blog

Enhancing security through Cyber Threat Intelligence – a review of the CTI year

infoguard-cyber-security-blog-three-lines-of-defence-en
Blog

From the “Three Lines of Defence” model to the “Three Lines Model”

cyber-security-blog-innovation-day-2023-innovations-trends-challenges
Blog

Innovations, trends and challenges in cyber security – that was the 11th InfoGuard Innovation Day

infoguard-cyber-security-blog-iso-iec-270012022-en
Blog

ISO 27001:2022 – what has changed and what you need to get done

infoguard-cyber-security-blog-rueckblick-2022-ausblick-2023-en
Blog

An exciting year for cyber security is both behind us and ahead of us

Blog

Advent, Advent, the school is “burning”! [Part 3]

infoguard-advent-the-school-is-burning-cyber-security
Blog

Advent, Advent, the school is “burning”! [Part 1]

infoguard-blog-dns-cyber-attacks
Blog

DNS on the front line in the defence against cyber-attacks

Blog

Why certain Swiss industrial companies are being hit by cyber-attacks

philippe-kaeppeli-cyber-security-blog-security-engineer-jobportrait
Blog

[Job portrait] What does a Security Engineer actually do?

infoguard-blog-cyber-resilience-part2-en
Blog

Cyber Resilience: CSIRT insights and emergency plan for top management

infoguard-blog-cyber-resilience-en
Blog

Dealing with cyber risks is a matter for the top management

infoguard-cyber-security-blog-security-lounge-2022
Blog

12. InfoGuard Security Lounge – the revival of the live event once again has surpassed all expectations

infoguard-luca-daniel-cyber-security-blog-en
Blog

My Berlin internship as an InfoGuard IT apprentice – Part 2

infoguard-luca-daniel-cyber-security-blog
Blog

Start-up vibes, doner kebabs and lots of sightseeing – my Berlin internship as an InfoGuard IT apprentice

infoguard-blog-aruba-networks-en
Blog

Improve security, performance and operational efficiency in the data centre

infoguard-blog-cyber-culture
Blog

Cyber Security Culture – “Us and the Others” within the Organisation

infoguard-allianz-risk-barometer-2022
Blog

Cyber risks being ranked in first place in the Risk Barometer 2022 shows that they are still on the rise

infoguard-cyber-security-consultant-sebastiano-davanzo
Blog

[Job portrait] What does a Cyber Security Consultant actually do?

infoguard-cyber-security-blog-cyber-attacks-are-making-headway
Blog

Cyber attacks are making headway – looking back and forward at cyber security

cyber-security-blog-innovation-day-2022-EN
Blog

In 2022, these cyber security issues will be keeping the it world on tenterhooks

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 3]

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]

infoguard-cyber-security-adventskalender
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 1]

infoguard-blog-isoiec27002:2021-en
Blog

ISO/IEC 27002:2022 – what you should know about the new changes

infoguard-blog-ransomware-lateral-movement-en
Blog

Stopping Ransomware and Lateral-Movement thanks to Segmentation

infoguard-cyber-security-blog-healthcare-en
Blog

What you need to be aware of when it comes to cyber security in the healthcare sector

infoguard-blog-why-backup-strategy
Blog

Why it’s so important to have a solid back-up strategy

infoguard-blog-vectra-inside-threat-en
Blog

Inside Threat and what lies behind it

infoguard-blog-devsecops-en
Blog

DevSecOps – how to make your DevOps Secure using Microgateways

infoguard-blog-airlock-zero-trust-en
Blog

Zero Trust and DevOps are revolutionising cyber security

infoguard-blog-incident-response-en
Blog

[Video] A cyber thriller in 48 hours

infoguard-blog-incident-response
Blog

Incident response: the police are your friends and helpers

infoguard-cyber-security-sql-injection
Blog

SQL injection – how hackers break into internal databases

infoguard-cyber-security-blog-it-hygiene
Blog

Why in Cyber Security, Hygiene is the Be-All and End-All too

infoguard-blog-look-back-over-cyber-security-in-2020
Blog

A year of great change – our look back over cyber security in 2020

infoguard-cyber-crime-cyber-security-blog-news-2020
Blog

Cyber Crime & Cyber Security 2020 – what you may have missed in the news

infoguard-cyber-security-hacker-cyber-crime-advent-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 3]

infoguard-cyber-security-blog-cyber-crime-advent-story-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 2]

infoguard-cyber-security-crime-advent-story-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 1]

infoguard-blog-backup-and-recovery
Blog

Why you should be treating your company data as if it were precious crown jewels

infoguard-blog-password-stealing-en
Blog

Password Stealing – how “safe” is my password

infoguard-blog-two-factor-authentication
Blog

Two-factor authentication – feel the authentication flow

infoguard-cyber-security-blog-ttx-en
Blog

Table-Top-Exercises (TTX) – think about the worst-case scenario

infoguard-cyber-security-blog-fleeceware-en
Blog

Beware of fleeceware – when “free” does not really mean free

infoguard-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – why you should be monitoring your cyber risks

infoguard-cyber-security-qr-code-security-en
Blog

QR code – a little square that poses an underrated cyber risk

infoguard-cyber-security-blog-corona-lessons-en
Blog

“Coronavirus, the last” – cyber security lessons that have been learned from the crisis

infoguard-cyber-security-blog-security-or-trust
Blog

Security or trust – which one comes first?

infoguard-blog-juniper-atp-en
Blog

Why Advanced Threat Prevention is so important

infoguard-cyber-security-blog-social-media-phishing-en
Blog

Social Media Phishing – Phishing gets Social

infoguard-cyber-security-blog-zero-trust-en
Blog

Zero Trust – take care in whom you trust

infoguard-cyber-security-easter-egg
Blog

“Easter egg” – the virtual Easter egg and its hidden back door

infoguard-cyber-security-coronavirus
Blog

Red alert ‒ the hacking trick with Coronavirus

36c3-ccc-infoguard-en
Blog

36C3 – something for everyone – from newbie hackers to dyed-in-the-wool nerds

infoguard-zero-trust-de
Blog

Zero trust is redefining cyber security

infoguard-CVE-2019-11184-en
Blog

CVE-2019-11184 – an Intel CPU vulnerability following 6 months of research

infoguard-cyber-security-blog-apprentices-career
Blog

[Interview] Young cyber security experts reveal what makes their training at InfoGuard unique

infoguard-cyber-security-ryuk-emotet-look-back-2019
Blog

The year of Emotet, Ryuk & co. – our look back over cyber security in 2019

infoguard-zukunftstag-2019
Blog

Cyber security “young blood” in the starting blocks – National Future Day 2019

infoguard-marcelli-hackistanbul2019-3
Blog

Capture The Flag – InfoGuard steps on to the podium at HackIstanbul 2019

infoguard-security-lounge-26-06-2019-2
Blog

10 years of the InfoGuard Security Lounge – Cyber security meets passion!

infoguard-cyber-security-blog-emotet-dynamite-phishing
Blog

Dynamite Phishing ‒ Emotet can forge e-mails almost perfectly

infoguard-blog-threat-intelligence
Blog

3 ways in which Threat Intelligence can help you to optimise your cyber security

Blog

Cyber security 2.0 - these 6 challenges await you in the future

Blog

Switzerland - a dream for cyber security experts

Blog

Detect & Respond – one of the key Topics at The InfoGuard Innovation Day 2019

Blog

The new Terabit era - are you ready for DDoS?

Blog

Two-factor authentication - when double security is cut in half

Blog

35C3 – Moving sofas, intelligent light bulbs and government birds

Blog

365 Days of Cyber Security – what moved you in 2018!

Blog

Why your suppliers can pose a threat to you and why supplier risk management is so important

Blog

About robots, cops and robbers - Swiss National Future Day 2018

Blog

Cyber security goes far beyond prevention

Blog

With the IoT, a global computer has been created – but how to keep it under control?

Blog

Opportunity breeds thieves – what hackers and burglars have in common...

Blog

How your Cyber Security can benefit from a home burglary

Blog

User and Entity Behaviour Analytics to the rescue, if the attacker is already in the system

Blog

Vulnerability Management – Keeping Weaknesses under control

Blog

Alexa, are you listening? 6 tips for the Secure use of language assistants

Blog

Network Access Control – your network’s brain

Blog

DDoS attacks under control? Not at all – this is just the tip of the iceberg

Blog

ISSS 2018 FinTech and Security – the world of finance within the digital revolution [Part 2]

Blog

ISSS 2018 FinTech and Security – the world of finance within the digital revolution [Part 1]

Blog

Containers challenge your vulnerability management

Blog

InfoGuard Security Lounge 2018 – the future starts today!

Blog

Area 41 – When Zurich becomes Switzerland’s Mecca for hackers

Blog

This is what distinguishes a good cyber security expert [Part 2]

Blog

What open source intelligence has to do with cyber security

Blog

Recruiting, keeping and motivating cyber security experts [Part 1]

Blog

Blockchain Summit 2018 – what goes on in the CryptoValley Zug

Blog

Cyber Risk Management ‒ a risk turns into an opportunity

Blog

Blockchain – what do Bitcoins, hashes and smart contracts have to do with cyber security

Blog

Bank robbery 2.0 – SWIFT cracks down with energy against cyber attacks

Blog

Cyber security will have a positive impact on the success of your enterprise – here is why

Blog

What a Wasp has to do with the OWASP Top 10 Risks of Web applications

Blog

Cyber revolution: In 2018, you must protect yourself against these 4 cyber risks

Blog

CISO & CIO take notice: these three cyber themes belong to your agenda in 2018

Blog

DNS Security – Do not let hackers in through the backdoor

Blog

Looking back to the year past: what has stirred the cyber security world

Blog

Cyber security – how to reach the end of the day and stay secure

Blog

Wanted: cyber security experts – is your security threatened?

Blog

You too need a cyber security strategy ‒ here is why

Blog

Our 10-Step checklist will help you be prepared for the GDPR

Blog

As a Swiss bank, you need to be in control of your operational risks

Blog

Look in the eyes of “digitisation's ugly sister”!

Blog

The 1001 tasks of a Chief Information Security Officer (CISO)

Blog

Why the Internet of Things (IoT) is going to revolutionise security

Blog

IAM vs. CIAM: Why is classic IAM no longer enough

Blog

Data Protection Officer – the specialist in data protection and GDPR

Blog

Chief Information Security Officer (CISO) ‒ an investment with ROI

Blog

How you can reduce privileged accounts and increase your security

Blog

6 good reasons for moving to a software-defined data centre model

Blog

Getting IoT projects securely on track

Blog

Why the human factor is more important for it security than technology

Blog

The General Data Protection Regulation GDPR – no need to panic!

Blog

The features of a truly effective Cyber Security Strategy

Blog

The “Cyber Security Guide”: a master plan for maximum Cyber Security

Blog

The Swiss financial market as a target for cyber attacks