Blog

Discover in-depth articles and updates on the key trends and current developments in the digital world and the technology sector.

NIS2 Directive for Swiss Companies: The Ultimate Implementation Guide

NIS2 Directive Switzerland: Practical implementation guide for Swiss companies. Requirements, deadlines, penalties, and implementation roadmap. Learn more now.
NIS2 Directive Switzerland: Practical implementation guide for Swiss companies. Requirements, deadli...
NIS2 Directive Switzerland: Practical implementation guide for Swiss companies. Requirements, deadli...

In times of identity-based security – is the network still necessary?

Identity-based security or network security? Discover why you don't have to choose between them and how modern IT architectures combine both approaches to provide genuine protection.
Identity-based security or network security? Discover why you don't have to choose between them and ...
Identity-based security or network security? Discover why you don't have to choose between them and ...

Is it cheaper to recover after a ransomware attack or to rebuild?

Is it cheaper to recover from a ransomware attack or to rebuild? We explain the true costs, risks, and decision-making criteria—and why the seemingly cheaper option often turns out to be the most expensive.
Is it cheaper to recover from a ransomware attack or to rebuild? We explain the true costs, risks, a...
Is it cheaper to recover from a ransomware attack or to rebuild? We explain the true costs, risks, a...

Zero Trust Transformation: Where do I actually start?

Approaching Zero Trust Migration Strategically: A Practical Guide for a Step-by-Step Transition. Learn how to integrate legacy systems and avoid common mistakes – from practice for practice.
Approaching Zero Trust Migration Strategically: A Practical Guide for a Step-by-Step Transition. Lea...
Approaching Zero Trust Migration Strategically: A Practical Guide for a Step-by-Step Transition. Lea...

Why Your Network Security Model Is Broken

Learn about the 7 strategic changes for modern network security that treat every access request as untrusted. Discover why traditional perimeter security fails and how to build resilience in cloud-first environments.
Learn about the 7 strategic changes for modern network security that treat every access request as u...
Learn about the 7 strategic changes for modern network security that treat every access request as u...

Zero Trust Demystified: What the Security Concept Can Truly Deliver and What It Cannot

Demystifying Zero Trust Architecture: What really lies behind the security concept? We'll dispel the myths and show you how to practically implement Zero Trust without replacing your entire network.
Demystifying Zero Trust Architecture: What really lies behind the security concept? We'll dispel the...
Demystifying Zero Trust Architecture: What really lies behind the security concept? We'll dispel the...

Why Most Risk Analyses Fail

Learn how to conduct effective cybersecurity risk analyses according to NIST 800-30. A practical guide to identifying threats, vulnerabilities, and protecting corporate assets.
Learn how to conduct effective cybersecurity risk analyses according to NIST 800-30. A practical gui...
Learn how to conduct effective cybersecurity risk analyses according to NIST 800-30. A practical gui...

Join us on the journey

Effortlessly schedule a conversation and discover how we bring success in the digital world to your company.

Contact us!

Grabenstrasse 15a

6340 Baar

Switzerland

+41 43 217 86 70

Copyright © 2025 ODCUS | All rights reserved.

Legal Notice