A Day in the Life of a Security Engineer

Head of Professional Services - Cybersecurity Engineer Blog

Interview with Harald Beutlhauser & Axel Rensing, Senior Professional Services Engineers What It Means to be a PS Engineer in Cyber Security Our Professional Services Engineers aren’t just like any you’ve met or worked with before – they are at the core of advanced cyber threat detection. What does that mean, you ask? Well, in […]

Akira Ransomware: How to Protect Your Business

Akira Blog - How the Akira hack could have been prevented

The Akira ransomware group quickly gained notoriety. The group emerged in March 2023 and is already the fourth most active group worldwide. If they keep up with this speed, they will be surpassing Lockbit soon, demanding millions in ransom from its victims. Akira mainly targets companies in various industries, including public, finance, real estate, manufacturing, […]

Air-Gapping: Not Only Love Is in the Air

Air-gapping as a security practice - Exeon blog

Can Air-Gapping Alone Improve Cybersecurity for Critical Industries? Air-gapping is a security measure designed to isolate digital assets and networks from outside connections, to protect against hackers, malware, and other threats by creating an impenetrable barrier. It has its merits, but it has its security issues too, and for a cybersecurity solution to deploy, it needs […]

Switzerland and the EU: NIS2 and New Cybersecurity Legislations

Switzerland and the EU - NIS2 and New Cybersecurity Legislations

The Information Security Act and NIS2: Strengthening Cybersecurity in Switzerland On November 8, 2023, the Federal Council decided to bring the new Information Security Act (ISG) and the associated implementing ordinances into force from January 1, 2024. The ISG bundles the relevant legal bases for cybersecurity in one law and leads to a fundamental restructuring […]

Obfuscation: Good to Protect, Hard to Detect

Obfuscation explained by Harald Beutlhauser - Exeon Blog

What is Obfuscation? Obfuscation is an important technique for protecting software, but it also carries risks, especially when used by malware authors. We took a closer look: Obfuscation refers to the technique of deliberately making information difficult to understand, especially in the realm of computer code. An important area of obfuscation is data obfuscation, where sensitive data is […]

How to Catch Data Exfiltration with Machine Learning

How to catch data exfiltration - Exeon blog

Why is Detecting Data Exfiltration So Important? In today’s landscape, there is an unprecedented surge in ransomware attacks and data breaches aimed at coercing businesses. Concurrently, the cybersecurity industry is confronted with numerous critical vulnerabilities within database software and corporate websites. These developments paint a grim picture of data exposure and unauthorized data removal that security leaders […]

Deep Packet Inspection vs. Metadata Analysis

Deep Packet Inspection vs. Metadata Analysis

As encrypted traffic soars and networks grow more complex, traditional Deep Packet Inspection (DPI) struggles. Enter metadata analysis — a lightweight, scalable, and encryption-proof solution powering the next generation of Network Detection and Response (NDR).

Cyber Resilience Act (CRA) is Here to Stay

The Cyber Resilience Act - CRA - Exeon Blog

The EU’s Cyber Resilience Act mandates built-in cybersecurity for all digital products. From CE marks to SBOMs and fast vulnerability reporting, it’s a new era of accountability. With full enforcement years away, tools like NDR remain critical for staying ahead of threats.

Why Zero Trust and Compliance Go Hand in Hand

Zero Trust and compliance go hand in hand - Exeon

Pairing Zero Trust with compliance frameworks like NIS2, GDPR, and HIPAA is essential. By integrating strict access controls, continuous monitoring, and advanced tools like Network Detection and Response (NDR), organizations boost their cyber resilience while aligning with legal requirements.