All you need to know about the job of Cybersecurity Architect

Find out more about the role, skills, training and salary of a cybersecurity architect, a key profession in the protection of IT systems.
Identity management: definition, challenges, and best practices

Who has access to what, when, and why? Identity management is the key to a secure, seamless, and compliant IT system. Here’s how to master it effectively.
Pentest: understanding penetration testing and protecting your IT systems

Discover pentesting: principles, types, key tools, steps of a penetration test, and the path to becoming a pentester in Switzerland.
SonarQube for analysing and strengthening code security

Secure your code with SonarQube Security. Detect vulnerabilities, integrate it into DevSecOps and continuously improve software quality.
Everything you need to know about cybersecurity engineers

Cybersecurity engineers play a key role in IT projects. Find out more about their typical assignments, skills, methods, tools and the pathway into this profession.
How should you go about getting trained in cybersecurity?

Are you looking to get a qualification in cybersecurity? Whether you’re passionate about IT, looking for a change of career, or already working in the field, this guide will help you choose the best training course in IT security. Discover the professions, recognized training courses, free and online training opportunities, and career prospects in the […]
Two-factor authentication: how can you secure your online access?

With cyberattacks continuing to increase, protecting online access has become essential for individuals and businesses alike. Data theft, account hacking and other cyberthreats are becoming increasingly common, making traditional passwords less and less secure. Two-factor authentication (2FA) is a security technology that strengthens online account security by adding an extra layer of protection. But how […]
Data security: protecting your sensitive information

Learn how to secure your corporate data with best practices and protection tools to avoid cyber threats and data loss.
Passwordless: security without passwords

Discover the concept of being ‘passwordless’, its benefits for IT security and how to implement passwordless solutions at your company. Overview What do we mean by ‘passwordless’? Passwordless is an authentication method that allows users to log in without using a password, based on factors such as biometrics (fingerprints, facial recognition) or physical security keys. […]
Raising your teams’ awareness of cybersecurity

In today’s connected world, businesses are constantly faced with increasingly sophisticated cyberthreats. But who is responsible for protecting your data? Who should be trained to recognise and counter these attacks? The answer is simple: every employee, from managers to junior staff. When should you take action? Now, before an attack strikes. Where might it happen? […]
Protect your business with state-of-the-art cybersecurity services

Discover how a cybersecurity company can protect your data and systems against cyberthreats and choose the right partner. Summary What is a cybersecurity company? A cybersecurity company is one that specialises in protecting computer systems, networks, software and data against cyberthreats. These threats could include malicious attacks such as hacking, viruses, ransomware, spyware and numerous […]
All about Checkmarx: the application security solution

Discover Checkmarx, the security analysis platform for software applications that helps you identify, prioritize and correct vulnerabilities! Summary What is Checkmarx? Checkmarx is a security analysis platform for software applications. In other words, it detects potential security flaws in software source code. The solution helps developers to identify and correct vulnerabilities early in the development […]