New Search

If you are not happy with the results below please do another search

7 search results for:


Companies must also protect robots from cyberattacks

Robots are the interface through which IT systems have a very concrete impact on the real world. Until now, dangers to humans and the environment have been minimised through strict isolation. With increasing networking, new technologies and forms of cooperation, this isolation is being broken down. This places new demands on cyber security. Until a […]


What are the challenges of managing cyber-attacks in a large company?

With the ever-increasing risks of cyber-attacks, companies need to make cyber security a priority. Today, it is not a question of “if” a company will suffer a cyber-attack, but “when” it will fall victim. Therefore, organisations need to implement measures to prevent and manage cyber incidents. This article discusses the challenges of managing cyber incidents […]


eDiscovery – the search for relevant information for investigations

Every day, the amount of data in organisations grows and so do the opportunities to misuse it. With eDiscovery, data is located, secured and searched for use as evidence in civil or criminal proceedings. Our author is a specialist in this topic and explains the complex process of eDiscovery. Differentiating eDiscovery from digital forensics Since […]


Vulnerabilities discovered in Swiss Post’s e-voting system

The public intrusion test of Swiss Post’s e-voting system carried out in recent weeks has aroused a great deal of interest among experts and the public, especially when the discovery of serious vulnerabilities became known. These incidents show how important cooperation and transparency are in the introduction of e-voting. In mid-February, Swiss Post published the […]