top of page

Search
All Posts


Supply Chain Risk: How a Shared Software Target Disrupted Heathrow & Brussels in One Weekend
Between Fri night, 19 Sept, and Sun, 21 Sept 2025, ransomware targeting Collins Aerospace’s MUSE check-in/boarding software disrupted...
Reto Zeidler
Sep 222 min read


Leadership vs. Management: Why the Difference Matters
The terms “leadership” and “management” are often used interchangeably. But while there is some overlap, they are not the same. The best...
Reto Zeidler
Aug 253 min read


Major Blow to Crypto Crime: German Authorities Dismantle €34 Million Money Laundering Operation
German Federal Criminal Police (BKA) and Frankfurt prosecutors shut down "eXch," one of Europe's largest anonymous cryptocurrency...
Reto Zeidler
May 292 min read


Blindspot Third-Party Risk Management - What CISOs and CROs Need to Know
Third-Party Risk Management (TPRM) has become critical as supply chain attacks surge by 431% since 2021. The 2024 CrowdStrike incident...
Reto Zeidler
May 293 min read


The Digital Heist Highway: How Cybercriminals Turn Stolen Bits into Cold Hard Cash
Cybercriminals have mastered the art of digital alchemy – transforming stolen data into untraceable wealth through sophisticated money...
Reto Zeidler
May 292 min read


Guide to OSINT Tools
Open-source intelligence tools (OSINT) are software solutions designed to assist in the collection and analysis of information from...
Reto Zeidler
May 2810 min read


Imagine if you staff an entire company with AI. Researcher did just this. And guess what happens?
Carnegie Mellon researchers created TheAgentCompany, a virtual firm staffed entirely by AI agents to test their workplace capabilities....
Reto Zeidler
May 253 min read


EU Digital Operation Resilience Act and Why It Matters for Swiss IT Service Providers
The Digital Operational Resilience Act (DORA) establishes a comprehensive regulatory framework for digital resilience in the EU financial...
Reto Zeidler
May 253 min read


How to Create an Effective AI Security Policy for Your Organization?
AI adoption has exploded since 2023, creating productivity gains but introducing significant security risks including shadow AI, prompt...
Reto Zeidler
May 253 min read


NIS2: What CISOs Need to Know
NIS2 represents a paradigm shift in EU cybersecurity regulation, mandating stronger security measures across critical sectors. For CISOs,...
Reto Zeidler
May 253 min read


Fake It Till You Make It: Deepfake in Today's Threat Landscape
The evolution of deepfake technology in cyberattacks has accelerated dramatically in 2024 and 2025. The most spectacular example is the...
Reto Zeidler
May 252 min read


Guide for free Cyber Security Training for Beginners and Practitioners
In today's rapidly evolving digital landscape, the importance of cybersecurity cannot be overstated. As threats become more...
Reto Zeidler
May 192 min read


What Can We Learn from recent Cyber Attack on British Retailers
Since the easter weekend the threat intel wires were filled with reports from a massive cyber attack on major British retailers Marks &...
Reto Zeidler
May 186 min read


Guide for Free Threat Intelligence Sources
Open source cyber threat intelligence platforms are a must-have for any organization looking to protect itself from cyber threats. They...
Reto Zeidler
May 186 min read


Why we don't have beaten ransomware yet? The economics of digital extortion
Despite increased awareness and significant law enforcement actions over the past 18 months, ransomware remains a persistent and evolving...
Reto Zeidler
May 183 min read
bottom of page