top of page



Reto Zeidler
Leader | Advisor | Lecturer
“Leadership in security means to ensure that security creates value to the business and the people.”
Not the typical "security guy" but a visionary leader in the field of information- and cyber security with more than 20 years of experience in various industries and regulated environments. Member of multiple national and international security communities and Lecturer at the Lucerne University of Applied Sciences, author and contributor to many papers, articles as well as keynote speaker.
Search
All Posts


Defending Democracy: Why We Must Treat the Information Space as Strategic Terrain
ccording to the article, the best-known Russian outlets, Russia Today and Pravda, publish between 800 and 900 articles per month in Switzerland, most of which qualify as disinformation. This is not isolated to Switzerland: across Europe, governments and multi-national organizations are recognizing that hybrid threats, blending cyber, information, and influence operations, are increasing in frequency and sophistication.
Reto Zeidler
Jan 182 min read


EU Cybersecurity Forecast 2026: What Leaders Must Reframe Now
Across the EU, threat intelligence and policy analysis point to the same pattern: attackers are combining AI-enabled techniques with geopolitical objectives, while organisations struggle to align cyber resilience with decision-making speed. At the same time, regulatory expectations are rising. NIS2 enforcement, DORA supervision, and data protection scrutiny are converging. Leaders are being asked not just whether controls exist, but whether governance actually works under str
Reto Zeidler
Jan 122 min read


Guide for free Cyber Security Training for Beginners and Practitioners (2026)
Updated guide for free cyber security training resources for beginners and advanced professionals.
Reto Zeidler
Dec 30, 20253 min read


Managed Security Services Are Optimised for Detection, Not Survival
How Managed Security Service Providers (MSSPs) are perceived is clear. They are expected to reduce operational risk, help with compliance and respond fast when things go wrong. ENISA's 2025 MSS Market Analysis reveals that this falls often short, especially once incidents move beyond detection. Here are the key gap's between what customers demand, what suppliers deliver and regulators expect. ENISA’s 2025 MSS Market Analysis was informed by a broad survey of stakeholders acr
Reto Zeidler
Dec 15, 20252 min read


The Cyber Resilience Act is not a product regulation. It is a leadership test.
Over the past two years, a recurring pattern has emerged in incidents across Europe. Vulnerabilities in widely used software components are discovered late, patched unevenly, and communicated poorly. When exploitation follows, the damage spreads across entire ecosystems, not just single organisations. Regulators responded accordingly. The EU Cyber Resilience Act, adopted in 2024 and entering application from 2027, shifts attention to the security of digital products placed on
Reto Zeidler
Dec 15, 20252 min read


Zero Klicks: AI will not kill the Internet but quietly the business models that are built on..
The underestimated economic implication of Zero-Click Searches.
Reto Zeidler
Dec 14, 20252 min read


Supply Chain Risk: How a Shared Software Target Disrupted Heathrow & Brussels in One Weekend
Between Fri night, 19 Sept, and Sun, 21 Sept 2025, ransomware targeting Collins Aerospace’s MUSE check-in/boarding software disrupted...
Reto Zeidler
Sep 22, 20252 min read


Leadership vs. Management: Why the Difference Matters
The terms “leadership” and “management” are often used interchangeably. But while there is some overlap, they are not the same. The best...
Reto Zeidler
Aug 25, 20253 min read


Major Blow to Crypto Crime: German Authorities Dismantle €34 Million Money Laundering Operation
German Federal Criminal Police (BKA) and Frankfurt prosecutors shut down "eXch," one of Europe's largest anonymous cryptocurrency...
Reto Zeidler
May 29, 20252 min read


Blindspot Third-Party Risk Management - What CISOs and CROs Need to Know
Third-Party Risk Management (TPRM) has become critical as supply chain attacks surge by 431% since 2021. The 2024 CrowdStrike incident...
Reto Zeidler
May 29, 20253 min read


The Digital Heist Highway: How Cybercriminals Turn Stolen Bits into Cold Hard Cash
Cybercriminals have mastered the art of digital alchemy – transforming stolen data into untraceable wealth through sophisticated money...
Reto Zeidler
May 29, 20252 min read


Guide to OSINT Tools
Open-source intelligence tools (OSINT) are software solutions designed to assist in the collection and analysis of information from...
Reto Zeidler
May 28, 202510 min read


Imagine if you staff an entire company with AI. Researcher did just this. And guess what happens?
Carnegie Mellon researchers created TheAgentCompany, a virtual firm staffed entirely by AI agents to test their workplace capabilities....
Reto Zeidler
May 25, 20253 min read


EU Digital Operation Resilience Act and Why It Matters for Swiss IT Service Providers
The Digital Operational Resilience Act (DORA) establishes a comprehensive regulatory framework for digital resilience in the EU financial sector, effective January 17, 2025. DORA applies to virtually all financial entities and critically extends to their ICT third-party service providers, regardless of location. Service providers to EU financial institutions must comply with stringent requirements for risk management, incident reporting, testing, and business continuity plann
Reto Zeidler
May 25, 20253 min read


How to Create an Effective AI Security Policy for Your Organization?
AI adoption has exploded since 2023, creating productivity gains but introducing significant security risks including shadow AI, prompt...
Reto Zeidler
May 25, 20253 min read


NIS2: What CISOs Need to Know
NIS2 represents a paradigm shift in EU cybersecurity regulation, mandating stronger security measures across critical sectors. For CISOs,...
Reto Zeidler
May 25, 20253 min read


Fake It Till You Make It: Deepfake in Today's Threat Landscape
The evolution of deepfake technology in cyberattacks has accelerated dramatically in 2024 and 2025. The most spectacular example is the...
Reto Zeidler
May 25, 20252 min read


What Can We Learn from recent Cyber Attack on British Retailers
Since the easter weekend the threat intel wires were filled with reports from a massive cyber attack on major British retailers Marks &...
Reto Zeidler
May 18, 20256 min read


Guide for Free Threat Intelligence Sources
Open source cyber threat intelligence platforms are a must-have for any organization looking to protect itself from cyber threats. They...
Reto Zeidler
May 18, 20256 min read


Why we don't have beaten ransomware yet? The economics of digital extortion
Despite increased awareness and significant law enforcement actions over the past 18 months, ransomware remains a persistent and evolving threat. The cybercrime landscape has transformed with fewer but more sophisticated criminal organizations operating like structured enterprises. Recent operations like "Endgame" have disrupted major players such as LockBit, yet the void was quickly filled by more aggressive groups. The financial impact remains staggering, with companies lik
Reto Zeidler
May 18, 20253 min read
bottom of page