The Exeon Blog

Welcome to the Exeon Blog page! As a passionate, interdisciplinary team of data scientists, machine learning experts, white hat hackers, network security specialists and business professionals, we have diverse insights to offer on the complex topic of cybersecurity. Through regular contact and discussions with industry leaders and IT Security decision-makers, we want to transverse these insights into applicable and compelling Blog posts for the interested public. Enjoy our selection of the most recent Blogs below.

How to Stay Secure While NIS2 Takes Its TimeOcto2: The Evolution of A Dangerous Malware FamilyIncident Response: Why Focus on Prevention & Detection FirstThe Privacy Dilemma in CybersecurityThe Security State of SwitzerlandCyber Resilience Act (CRA) is Here to StayFeedMeter: Smarter Threat IntelligenceZero Trust is Good, Control is Better Last Call for DORAHappy 8th Birthday, Exeon!A Wrap-Up of 07-19Obfuscation: Good to Protect, Hard to DetectNot Only Love is in the AirLive the IT/OT Convergence, Enhance Security!Extending NIS and DORA to OT Networks: A Zero Trust ApproachBest-of-Breed Done RightUncovering Blind Spots: The Crucial Role of NDR in Zero-Day Exploit DetectionTo Cloud or Not to Cloud Look Who Entered Your Library!2024 Allianz Risk Barometer: Heightened Alarm on Cyber ThreatsHow Zero Trust Makes You DORA-CompliantHow to Monitor & Stop Supply Chain AttacksNIS2 and DORA: Managers Are Liable for CybersecurityWhy Zero Trust and Compliance Go Hand in HandMajor SOC Mistakes and What You Can Do to Avoid ThemEnhancing Security Detection: Revolutionizing Risk-Based AlertingAkira Ransomware: Understanding the Global Threat and How to Protect Your BusinessUsing Behavior Analytics to Detect Changes to your OT EnvironmentHow to Catch Data Exfiltration with Machine LearningA Day in the Life of a Security EngineerWhy Customers Love ExeonTrace (as a Managed Solution)Everything EU & Swiss Companies Should Know About DORA (Digital Operational Resilience Act)The Vulnerability of Zero Trust: Lessons from the Storm 0558 HackHow NIS2 and ISG Shape Cybersecurity in Switzerland & the EUThe Key to Hacker HappinessRansomware Protection: How to Protect Your Business from Cyber ExtortionHow Network Detection & Response (NDR) Monitors OT EnvironmentsHow to Use ExeonTrace to Detect the Exploitation of Network Device VulnerabilitiesMachine Learning Algorithms from a Detection Engineers' PerspectiveBeyond IT Security: The Central Role of NDR in OT Network ProtectionNavigating the Impact of NIS2 on Network Monitoring for Critical Infrastructure: A Comprehensive GuideThe Future of Network Security: Predictive Analytics and ML-Driven SolutionsSecIT 2023: An Outlook on a Secure FutureLuca Forcellini becomes Senior Channel Manager at ExeonExeon in 2023 – Skills, Growth & ChallengesPress Release: Exeon Analytics Simplifies Integration of Data SourcesEnBW Cyber Security is partnering up with Exeon Analytics for managed service operations in Germany  Exeon wins the PwC Cybersecurity & Privacy Solution of the Year AwardWhy Cybersecurity Start-ups are winning the Innovation RaceReliable intrusion prevention even for encrypted network traffic and zero-day attacksHow Network Detection and Response (NDR) Fills the Security Gaps of Intrusion Prevention Systems (IPS) Exeon: EDR needs NDR for comprehensive security Exeon revolutionises NDR through metadata analysis Exeon recommends consistent monitoring of third-party applicationsManaged Security Services with Ensec and ExeonWhy Organizations Need Both EDR and NDR for Complete Network ProtectionRansomware and the Need for NDR to Provide Robust ProtectionExeon simplifies the deployment of Network Detection and ResponseSevere vulnerability in the Spring FrameworkThird-party cyber risks – and how ExeonTrace can provide complete system transparencyNetwork Detection & Response establishes itself as central cybersecurity pillarDeep Packet Inspection vs. Metadata Analysis of NDR solutionsThreat Hunting and Detection of the Log4j Exploit using the ExeonTrace NDR - Part IIThreat Hunting and Detection of the Log4j Exploit using the ExeonTrace NDRThe importance of Diversity in CybersecuritySOC Visibility Triad and the role of NDR solutionsWhy ExeonTrace is the NDR of choice for CISOs of industry-leading companies across EuropeThe Importance of an NDR Solution to Early Detect Supply Chain Attacks in Corporate NetworksNDR: The new pillar of cybersecurityNext-Gen Network Detection & ResponseAttack on MS Exchange Server: BSI declares "red" alert for the first time in seven yearsSwiss cyber security company Exeon accelerates European Go-to-MarketHow ExeonTrace can help detect the Microsoft Exchange hackDetecting the highly evasive Sunburst attack using an (old) ML modelXDR – A new weapon in the fight against cyber threats