Aarau and Morges, 21.5.2025. Swiss Post Cybersecurity AG has just successfully concluded its series of security conferences in three parts of the coun …
Overview TheNetwork and Information Systems Directive2 (NIS2) is an updated legal framework designed to improve cybersecurity in the European Union. B …
Use Case Testing Preparation The first step is to analyze which types of logs exist and which could be used to detect the suspicious behavior. How is …
Information security and privacy Many companies are currently unsure whether their IT security measures and any existing ISMS already meet data protec …
The Privacy Impact Assessment (PIA) should begin as early as possible in a project, be it a new project or the conversion of an infrastructure - prefe …
Vulnerability versus configuration management Nowadays, IT professionals are inundated with reports of vulnerabilities. In most cases, these are produ …
Definition: What is a SIEM? SIEM stands for Security Information and Event Management System. Before we look at the additional benefits of an SIEM, we …
In the last three years, 4 percent of all SMEs in Switzerland have fallen victim to a cyberattack with strong impact. This is according to the Cyber S …
These vulnerabilities, discovered by security researchers from Swiss Post Cybersecurity, Ralph El Khoury and Patrick Mkhael, affect various components …