Strong Impulses for Incident Response A key highlight was the ransomware incident response training, which was very practical. Despite our well-establ …
Aarau and Morges, 21.5.2025. Swiss Post Cybersecurity AG has just successfully concluded its series of security conferences in three parts of the coun …
Overview The Network and Information Systems Directive2 (NIS2) is an updated legal framework designed to improve cybersecurity in the European Union. …
Use Case Testing Preparation The first step is to analyze which types of logs exist and which could be used to detect the suspicious behavior. How is …
Information security and privacy Many companies are currently unsure whether their IT security measures and any existing ISMS already meet data protec …
The Privacy Impact Assessment (PIA) should begin as early as possible in a project, be it a new project or the conversion of an infrastructure - prefe …
Vulnerability versus configuration management Nowadays, IT professionals are inundated with reports of vulnerabilities. In most cases, these are produ …
Definition: What is a SIEM? SIEM stands for Security Information and Event Management System. Before we look at the additional benefits of an SIEM, we …
In the last three years, 4 percent of all SMEs in Switzerland have fallen victim to a cyberattack with strong impact. This is according to the Cyber S …