Switzerland’s Security Situation: Hybrid Threats Require Fundamental Defense Strategies

Switzerland cybersecurity situation and defense strategies

Switzerland’s security environment is becoming more complex from year to year, as reported by the Federal Intelligence Service (FIS) [Nachrichtendienst des Bundes (NDB)] in its annual report “Swiss Security 2024”. Of particular concern are international terrorism, current military conflicts, and increasing cooperation between various autocracies that cooperate at a political and military level. This development […]

Uncovering Blind Spots: Zero-Day Exploit Detection

Why Network Detection and Response is the solution against Zero-Day exploits

Why NDR is crucial to detect zero-day exploits Understanding Zero-Day Exploits Within the realm of cybersecurity, zero-day exploits pose a unique challenge to consumers and vendors alike; how do you identify and mitigate the risks of an unknown vulnerability in real time? These threats exploit vulnerabilities in software, hardware, or protocols that are not yet […]

How to Detect the Microsoft Exchange Hack

How to detect the Microsoft Exchange Hack

This article shows how Exeon helps detect Microsoft Exchange server compromises through automated anomaly detection and manual traffic analysis—providing vital visibility in one of the largest cyberattacks.

Beyond IT Security: OT Network Protection

OT Network Protection - Exeon Cybersecurity Blog

Why is Visibility into OT Networks Pivotal? The significance of Operational Technology (OT) for businesses is irrefutable, flourishing alongside the thriving IT sector. OT includes industrial control systems, manufacturing equipment, and devices that oversee and manage industrial environments and critical infrastructures. In recent years, adversaries have begun exploiting the frequent lack of detection and protection […]

NIS2 & DORA: Managers Are Liable for Cybersecurity

NIS2 and DORA liability - Cybersecurity blog

Introduction Manager liability in connection with undetected cybersecurity incidents in Europe is subject to different legal frameworks, which can vary depending on the country and industry. NIS2 (Network and Information Systems Directive 2) and DORA (Digital Operational Resilience Act) are now intended to standardize the specific legal framework and regulations at the European level and provide new guidelines for […]

Smarter Cyber Threat Intelligence: FeedMeter

FeedMeter Cyber Threat Intelligence by Dr. Markus Happe

(Photo credit: ZHAW Zurich University of Applied Sciences) A Research & Development Project on Enhancing Cyber Defense Cyber Threat Intelligence: In today’s evolving cyber landscape, understanding the adversary through cyber threat intelligence (CTI) is essential for effective defense. However, managing CTI feeds remains a challenge due to the difficulty in assessing feed quality and the […]

Live the IT/OT Convergence, Enhance Security!

IT and OT Convergence in Cybersecurity on the Exeon blog

From Data to Defense: How to Better Integrate IT with OT The idea of technological convergence is not exactly new. By integrating different technologies and making them work together efficiently as a single, cohesive system, companies can increase their efficiency, reduce errors, lower costs, improve workflows and achieve measurable competitive advantages. Enterprise IT has long […]