Cybersecurity and IT forensics EN

Referendum against the E-ID law

,
/
There is a need for usable and trustworthy electronic identification. It is a pillar of digital democracy and will also be used for the exercise…

Companies must also protect robots from cyberattacks

,
/
Robots are the interface through which IT systems have a very concrete impact on the real world. Until now, dangers to humans and the environment…

What are the challenges of managing cyber-attacks in a large company?

,
/
With the ever-increasing risks of cyber-attacks, companies need to make cyber security a priority. Today, it is not a question of "if" a company…

Challenges in digital forensics on smartphones

,
/
Smartphone forensics is a relatively new and rapidly developing area of interest within digital forensics. The market launch of "Simon", the…

eDiscovery – the search for relevant information for investigations

,
/
Every day, the amount of data in organisations grows and so do the opportunities to misuse it. With eDiscovery, data is located, secured and…

Vulnerabilities discovered in Swiss Post’s e-voting system

,
/
The public intrusion test of Swiss Post's e-voting system carried out in recent weeks has aroused a great deal of interest among experts and…