EU guard rails such as NIS2, CRA and KRITIS umbrella law protect IT infrastructures from cyber attacks
Blog

NIS2, CRA, KRITIS, and March 6: Now it's Time to Show you're Doing it!

Sunset in the office, time is pressing in the background, an ISMS according to ISO must be implemented as quickly as possible.
Blog

Want to implement ISMS according to ISO 27001 quickly? A reality check.

swift-v2026-global-sphere-digital-global-transactions-cyberresilient
Blog

Preparing Swift CSCF v2026 Assessment: The Checklist for Independent Audits

Cyber_defense_with_Zero_Trust_under_AI_and_Compliance_InfoGuard
Blog

Zero Trust from 2026: 3 practical Approaches to Cyber Defence between AI and Compliance

Cyber_Security_Radar_2026_Strategic_Outlook_InfoGuard
Blog

Cyber Security Radar 2026: Key agenda items for CISOs and CIOs

FINMA-Audit_Implementation_InfoGuard
Blog

From FINMA Audit to Implementation: Cyber Resilience is a Management Responsibility

OT systems under hybrid control between humans and automation
Blog

IEC 62443 meets Zero Trust: How Cyber Resilience is created in OT Systems

DevSecOps secures the software development lifecycle at all touchpoints
Blog

DevOps at the Limit: How DevSecOps protects against Cyber Risks

Fending off data theft through legal requirements.
Blog

Implement ISG & NIS2 with ISMS according to ISO 27001: 6 key industries in focus

Global supply chains symbolized by a chain of loaded container ships
Blog

Secure Supply Chain Management: Guidelines for Successful TPRM

In the dual role of DPO and CISO, a specialist sits opposite their mirror image.
Blog

CISO/DPO Dual Role: Efficiency Booster or Conflict in Security & IMS?

EU guard rails for the use of AI embodied by high-tech robots
Blog

EU AI Act: Clear Guardrails are now Levering AI out of its Blind Spot

SWIFT Compliance Assessment ensures security and compliance readiness
Blog

SWIFT CSCF v2025 Increases the Pressure: Only Cyberresilient is Compliant

EU compliance package also for Swiss exporters
Blog

CRA & NIS2: Opportunity or Upheaval for Swiss Exporters

Secure cloud computing using cloud risk assessment
Blog

Secure Cloud Computing: How to Avoid Compliance Violations

Revised Swift CSCF v2024 with focus on third party risk management
Blog

Revised Swift CSCF v2024: Focus on Third-party risk Management

Infoguard Blog - Operational resilience through DORA-compliant cyber defence
Blog

Operational Resilience: Efficient and DORA-compliant Cyber Defence

CRA gap assessment for compliance with Cyber Resilience Act
Blog

Cyber Resilience Act: Final Regulation is About to be Passed

How a data protection incident reinforces the realisation that data protection is a must.
Blog

Privacy alert: Lessons from a healthcare company's misstep

The clock is ticking: stricter NIS2 guidelines from October 2024, not just for CRITIS companies.
Blog

The clock is ticking: stricter NIS2 guidelines from October 2024

Banks must fulfil further FINMA requirements. Infoguard summarises these in a checklist.
Blog

FINMA circular 2023/1 Operational Risks and Resilience – Ready for an audit?

Cyber security trends: review and outlook 2023/2024 (InfoGuard Cyber Security Blog)
Blog

Cyber Security Trends: Review of 2023 & Outlook for 2024

Integrated Management System for Information Security and Data Protection (InfoGuard Cyber Security Blog)
Blog

Integrated Management System for Information Security and Data Protection

Cyber Defence: Why NIS2 is a must (InfoGuard Cyber Security Blog)
Blog

NIS2 – Cyber Defence is a Must, not only for KRITIS

Risk Management in Practice: Lessons from Diving for IT Security (Cyber Security Blog)
Blog

Risk Management in Practice: Lessons from Diving for IT Security

Infoguard Cyber Security Blog: SWIFT change to v2023
Blog

SWIFT CSCF v2023 – New Changes for Enhanced Cyber Security

InfoGuard Cyber Security CRA: EU flag made of binary numbers
Blog

Cyber Resilience Act – Get Yourself and Your Products up to Speed for the CRA

SIC5 – Instant Payment of banks (InfoGuard Cyber Security Blog)
Blog

SIC5 – What you need to know about banks’ “instant payments”

The Information Security Act (ISG) and its revision: consequences and obligations with regard to cyber security
Blog

ISG revision: consequences & obligations for critical infrastructure operators [Part 2]

The Information Security Act (ISG) and its revision: consequences and obligations with regard to cyber security
Blog

ISG revision: consequences & obligations for critical infrastructure operators [Part 1]

infoguard-cyber-security-blog-iso-iec-270012022-en
Blog

ISO 27001:2022 – what has changed and what you need to get done

infoguard-cyber-security-blog-finma-circular-2023-1-operational-risks-and-resilience-banks
Blog

Are you ready for the new FINMA circular 2023/1 “Operational risks and resilience – Banks”?

infoguard-cyber-security-data-protection-law
Blog

Focus on data protection: The new Swiss data protection law and its consequences

infoguard-nis-2-eu-richtlinie-datenschutz
Blog

NIS 2 – an overview of the EU’s new Cyber Security Directive

Blog

Cyber defence demands expertise in cyber security, legal and risk transfer

infoguard-identity-centred-security-putting-it-into-practice-cyber-security-blog
Blog

“Identity-centred security – putting it into practice”

infoguard-cyber-security-architecture-digest-2021
Blog

Architecture Digest 2021 – Particular concerns of our InfoGuard clients

infoguard-blog-privilegied-access-cloud-en
Blog

Privileged access to the Cloud – this is how to avoid damage

infoguard-swiss-data-protection-act-cyber-security-blog
Blog

The New Swiss Data Protection Act – The List of Processing Activities [Part 2]

infoguard-blog-ot-security-safety
Blog

OT-Security, because it’s all about all of our safety and security

infoguard-blog-KI-cyberattacken-en
Blog

Fighting cyberattacks – AI both as a shield and a weapon

infoguard-cyber-security-supply-chain-risk-management
Blog

A triangular relationship that comes with risks – Supply Chain Risk Management

infoguard-blog-swiftcscfv2021-en
Blog

SWIFT CSCF v2021 – are you ready for the independent assessment?

infoguard-cyber-blog-vectra0365
Blog

Hackers and their target of choice – Microsoft 365 services

infoguard-cyber-security-swiss-data-protection-act
Blog

The new Swiss Data Protection Act – the most important new features [Part 1]

infoguard-cyber-security-blog-home-office-working-from-home-monitoring-data-protection
Blog

Trust is good, but monitoring is better – monitoring and data protection when working from home

infoguard-cyber-security-blog-it-security-architect
Blog

The (non-) routine job of an IT security architect

infoguard-cyber-security-blog-biometric-authentication
Blog

How to use biometric authentication and remain compliant with data protection regulations

infoguard-cyber-security-blog-dsg-2020
Blog

If you don't keep up with the times, time moves on without you – or replacing the Federal DSG

infoguard-blog-psd2-en
Blog

PSD2 – what you should know about it and why it is a guarantee of security in “Open Banking”

infoguard-blog-iso-iec27701-data-governance-en
Blog

ISO/IEC 27701 – the aspects of data protection that are integrated in the ISMS

infoguard-business-continuity-management-bcm-en
Blog

Business Continuity Management (BCM) – being prepared for global events

infoguard-iec-62443-ot-security-en
Blog

IEC 62443 – or how to implement OT security in an efficient and reliable way

infoguard-cyber-security-blog-swift-v2020-en
Blog

SWIFT CSP v2020 – why you should never lose track of these controls

infoguard-cyber-security-ikt-minimalstandards-en
Blog

Efficiently Implementing and maintaining the ICT minimum standard

infoguard-cyber-security-blog-gcr-ikt-1-en
Blog

Governance, Risk & Compliance (GRC) – how to manage cyber risk while ensuring compliance!

infoguard-swift-cscf-assessment-en
Blog

SWIFT Customer Security Programme – are you ready for the upcoming assessment?

infoguard-cyber-security-ciso-tornado-en
Blog

CISOs in the eye of the storm due to a security incident

infoguard-cloud-penetration-testing
Blog

Cloud penetration testing – Find the holes in your cloud!

infoguard-cyber-security-blog-data-loss-prevention-dlp
Blog

DLP – How to protect yourself in a pragmatic way against losing data

infoguard-cyber-security-datenschutzstrategie-data-privacy-strategy
Blog

Data privacy strategy – what about your data protection strategy?

Blog

2018 - The year of the GDPR (General Data Protection Regulation) is not over yet!

Blog

Alexa, are you listening? 6 tips for the Secure use of language assistants

Blog

GDPR: 1, 2 or 3 – the last chance is (soon) over

Blog

Cyber revolution: In 2018, you must protect yourself against these 4 cyber risks

Blog

Our 10-Step checklist will help you be prepared for the GDPR

Blog

As a Swiss bank, you need to be in control of your operational risks

Blog

NIST cyber security framework – the five perspectives of cyber security

Blog

Our pentesters show how easy it is to hack IoT devices

Blog

IAM vs. CIAM: Why is classic IAM no longer enough

Blog

Data Protection Officer – the specialist in data protection and GDPR

Blog

How you can reduce privileged accounts and increase your security

Blog

The General Data Protection Regulation GDPR – no need to panic!

Blog

The “Cyber Security Guide”: a master plan for maximum Cyber Security