InfoGuard Cyber Security Lounge: Welcome to the 13th Security Lounge at Casino Zug
Blog

Raising the Bar at the 13th InfoGuard Security Lounge – Impressions, Insights and Highlights

infoguard-cyber-security-blog-rueckblick-2022-ausblick-2023-en
Blog

An exciting year for cyber security is both behind us and ahead of us

infoguard-blog-cyber-attack-on-your-identitiy-provider-en
Blog

A cyber-attack on your identity provider – what you need to do now

infoguard-cyber-security-blog-ddos-rekordjahr-2022-en
Blog

Why a new record number of DDoS attacks are predicted in 2022

infoguard-allianz-risk-barometer-2022
Blog

Cyber risks being ranked in first place in the Risk Barometer 2022 shows that they are still on the rise

infoguard-cyber-security-consultant-sebastiano-davanzo
Blog

[Job portrait] What does a Cyber Security Consultant actually do?

infoguard-cyber-security-sase-secure-service-edge
Blog

Secure Access Service Edge (SASE) – The Future of Cloud Security

infoguard-cyber-security-supply-chain-risk-management
Blog

A triangular relationship that comes with risks – Supply Chain Risk Management

infoguard-cyber-security-blog-stalkerware
Blog

Stalkerware – when the smartphone turns into a bugging device

infoguard-cyber-security-blog-ransomware-hacker
Blog

Ransomware attacks becoming more and more professional – and dangerous

infoguard-cyber-security-blog-it-hygiene
Blog

Why in Cyber Security, Hygiene is the Be-All and End-All too

infoguard-cyber-crime-cyber-security-blog-news-2020
Blog

Cyber Crime & Cyber Security 2020 – what you may have missed in the news

infoguard-cyber-security-hacker-cyber-crime-advent-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 3]

infoguard-cyber-security-blog-cyber-crime-advent-story-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 2]

infoguard-cyber-security-crime-advent-story-2020
Blog

Keeping the best till last − our cyber-crime advent story for 2020 [part 1]

infoguard-psychology–the-underrated-force-in-cyber-security
Blog

Psychology – the underrated force in cyber security

infoguard-cyber-security-qr-code-security-en
Blog

QR code – a little square that poses an underrated cyber risk

infoguard-cyber-security-blog-corona-lessons-en
Blog

“Coronavirus, the last” – cyber security lessons that have been learned from the crisis

infoguard-cyber-security-blog-home-office
Blog

Home office? Why not, but do it “securely” with these 5 tips

infoguard-cyber-security-ryuk-emotet-look-back-2019
Blog

The year of Emotet, Ryuk & co. – our look back over cyber security in 2019

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 4]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 3]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 2]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 1]

infoguard-cyber-security-threat-report-2020
Blog

A look into the cyber crystal ball – the Threat Report 2020

infoguard-zukunftstag-2019
Blog

Cyber security “young blood” in the starting blocks – National Future Day 2019

infoguard-cloud-penetration-testing
Blog

Cloud penetration testing – Find the holes in your cloud!

infoguard-next-generation-web-application-security-waf
Blog

Disrupt or be disrupted – WAFs and digital transformation

infoguard-cyber-security-zero-trust-architektur
Blog

Zero trust in cyber security – trust no-one!

infoguard-cyber-security-blog-whaling
Blog

Whaling – don't fall into cyber criminals clutches

infoguard-blog-threat-intelligence
Blog

3 ways in which Threat Intelligence can help you to optimise your cyber security

Blog

Cyber security 2.0 - these 6 challenges await you in the future

Blog

Endpoint Detection & Response - the benefits of a proactive threat hunting approach

Blog

[Video] EDR matters: How to reduce time-to-detect

Blog

2018 - The year of the GDPR (General Data Protection Regulation) is not over yet!

Blog

How your Cyber Security can benefit from a home burglary

Blog

Alexa, are you listening? 6 tips for the Secure use of language assistants

Blog

Network Access Control – your network’s brain

Blog

DDoS attacks under control? Not at all – this is just the tip of the iceberg

Blog

SOC 2.0 – or the miracle weapon against cyber threats

Blog

[Study] The future of apps, or how will your everyday life look like in year 2030

Blog

Cyber security will have a positive impact on the success of your enterprise – here is why

Blog

How can Gartner's Magic Quadrant help you with Intrusion Detection & Prevention

Blog

CISO & CIO take notice: these three cyber themes belong to your agenda in 2018

Blog

DNS Security – Do not let hackers in through the backdoor

Blog

Cyber security – how to reach the end of the day and stay secure

Blog

Wanted: cyber security experts – is your security threatened?

Blog

Backstage at InfoGuard’s Cyber Defence Center

Blog

Look in the eyes of “digitisation's ugly sister”!

Blog

The 1001 tasks of a Chief Information Security Officer (CISO)

Blog

Our pentesters show how easy it is to hack IoT devices

Blog

IAM vs. CIAM: Why is classic IAM no longer enough

Blog

Be faster than your attacker – thanks to artificial intelligence!

Blog

Chief Information Security Officer (CISO) ‒ an investment with ROI

Blog

Vulnerability management: no chance for hackers!

Blog

The Swiss financial market as a target for cyber attacks