Contributions from our consultants

Stay informed with the latest articles, commentaries and presentations from our IT security expertise

TEMET AG Blog

What our experts say

Our security experts regularly report on current topics - be it in specialist articles, commentaries or in presentations at conferences and events.

Teaser Image
02.04.2025| Markus Günther | Article

Post-quantum Cryptography: a New "year 2000" Hype?

Read article
Teaser Image
22.10.2024| Bruno Blumenthal | Presentation

AI Compliance Essentials: Standards and Emerging Regulations

Read article
Teaser Image
11.09.2024| Markus Günther | Article

Post Quantum Cryptography - Do the Locks Used Hold Up?

Read article
Teaser Image
08.07.2024| Markus Günther | Article

Security Culture is more than Awareness

Read article
Teaser Image
17.06.2024| Michael Veser | Article

Chat Applications Effectively Monitored by the SOC

Read article
Teaser Image
10.06.2024| Michael Veser | Article

How you can Incorporate your Company's own Data into a Generative AI Application

Read article
Teaser Image
10.06.2024| Michael Veser | Article

How Data is Stored for use with AI Models

Read article
Teaser Image
18.03.2024| Bruno Blumenthal | Article

Against the Procured Security Incident - Supply Chain Risk Management

Read article
Teaser Image
24.10.2023| Markus Günther et al. | Presentation

One size fits all was yesterday - efficient awareness made @SBB

Read article
Teaser Image
19.06.2023| Michael Veser | Article

The Special Requirements of an IoT PKI

Read article
Teaser Image
19.06.2023| Michael Veser | Article

How a Key Management System Can Help You With FADP Compliance

Read article
Teaser Image
03.05.2023| Bruno Blumenthal | Presentation

Cyber attacks - a look behind the headlines

Read article
Teaser Image
25.10.2022| Bruno Blumenthal | Presentation

Agile use case development with MITRE ATT&CK

Read article
Teaser Image
30.09.2022| Daniel Brunner | Article

Network Services - Unattainably Good

Read article
Teaser Image
09.07.2022| Daniel Brunner et al. | Commentary

Digital Technologies Podcast

Read article
Teaser Image
03.06.2022| Bruno Blumenthal | Article

Cyber Resilience with the ICT Minimum Standard

Read article
Teaser Image
02.06.2022| Daniel Brunner | Article

The Challenges of Online Meetings: How To Make Your Meeting a Success

Read article
Teaser Image
01.06.2022| Daniel Brunner | Article

Basic Knowledge Devsecops

Read article
Teaser Image
17.01.2022| Bruno Blumenthal | Article

Identify and Protect before Detect and Respond

Read article
Teaser Image
01.12.2021| Thomas Kessler | Article

The Dark Side of Collaboration Platforms

Read article
Teaser Image
01.12.2021| André Clerc et al. | Article

The Elegance of Let's Encrypt in an Internal PKI

Read article
Teaser Image
09.11.2021| Christoph Koch | Commentary

Corporate Resilience from Cyber Risk and Corporate Risk Perspective

Read article
Teaser Image
12.10.2021| Alex Rhomberg et al. | Presentation

Access management turned around

Read article
Teaser Image
29.06.2021| Thomas Bühler | Article

Modern Authentication - Token Exchange

Read article
Teaser Image
16.03.2021| Thomas Bühler | Article

Summary of the Solarwinds Attack

Read article
Teaser Image
16.03.2021| Markus Günther | Article

Swift CSP: What Will Change for BIC Users in 2021

Read article
Teaser Image
09.03.2021| Thomas Kessler | Article

2-factor Authentication of Healthcare Professionals

Read article
Teaser Image
15.12.2020| Gregor Walter | Article

Threat Analysis of the EKANS Ransomware - How Honda had to Stop Production

Read article
Teaser Image
28.10.2020| Bruno Blumenthal | Presentation

CyberThreats - A peek behind the headlines

Read article
Teaser Image
12.10.2020| Thomas Bühler | Article

Central Authentication and Authorization Management - An Opportunity for the Future

Read article
Teaser Image
06.03.2020| Thomas Kessler | Presentation

2FA for the authentication of HCP at the EPR and in the cloud

Read article
Teaser Image
05.03.2020| Thomas Kessler | Presentation

Die Verwaltung von GFP im EPD: Sisyphos ruft Herkules

Read article
Teaser Image
21.11.2019| Thomas Kessler | Presentation

IAM architecture for the cloud era

Read article
Teaser Image
15.10.2019| Bruno Blumenthal | Presentation

In our SOC we Trust

Read article
Teaser Image
02.09.2019| Daniel Felix Maurer | Article

ISMS 2020 - A Tiger in Sheep's Clothing

Read article
Teaser Image
28.08.2019| Thomas Kessler | Presentation

The EPR in the field of tension between self-determination and data analysis

Read article
Teaser Image
20.08.2019| Bruno Blumenthal | Article

How to Migrate Securely to the Cloud

Read article
Teaser Image
04.07.2019| Thomas Kessler | Article

EPR HCP Administration: Vision Meets Reality

Read article
Teaser Image
21.05.2019| Daniel Brunner | Presentation

After Paperless comes Passwordless

Read article
Teaser Image
07.03.2019| Thomas Kessler | Presentation

2FA in the EPD: An orientation guide

Read article
Teaser Image
01.03.2019| Thomas Kessler | Article

2-factor Authentication: Not Only Important for the EPR!

Read article
Teaser Image
11.02.2019| André Clerc | Article

Industry 4.0 (IIoT): The Advent of Cryptography

Read article
Teaser Image
18.12.2018| André Clerc | Article

The Agony of Choice: Android and iOS in Corporate use

Read article
Teaser Image
18.09.2018| Daniel Felix Maurer | Article

Sourcing a SOC / CDC requires Consideration

Read article
Teaser Image
30.06.2018| Michael Roth | Article

Data Protection vs. Information Security?

Read article
Teaser Image
17.05.2018| Thomas Kessler et al. | Presentation

The Future of Strong Authentication

Read article
Teaser Image
14.05.2018| Thomas Kessler | Article

Informational Self-Determination: How do we Deal with the Upcoming Upheaval?

Read article
Teaser Image
29.03.2018| Adrian Bachmann | Article

Death to the Password - Long Live the Password

Read article
Teaser Image
08.03.2018| Thomas Kessler et al. | Presentation

EPR connection of the University Hospital Basel - implementation of important use cases

Read article
Teaser Image
21.11.2017| André Clerc | Article

Priceless: New Swift Rules for Financial Service Providers

Read article
Teaser Image
07.11.2017| Thomas Kessler | Article

Information Security in Cloud Computing

Read article
Teaser Image
22.09.2017| Thomas Kessler | Presentation

Security issues with the EPR connection

Read article
Teaser Image
08.09.2017| Thomas Kessler | Article

Information Security for the EPR Connection

Read article
Teaser Image
08.07.2017| Alex Rhomberg | Article

Swift Arms Itself in the Fight against Cyber Attacks

Read article
Teaser Image
27.06.2017| Stephan Töndury | Presentation

Selected aspects of the GDPR and their significance for IT in Switzerland

Read article
Teaser Image
22.06.2017| Marcel Hausherr | Presentation

Cybersecurity Defense Plan

Read article
Teaser Image
09.03.2017| Thomas Kessler | Presentation

Cybersecurity in the EPR - tasks, competencies and responsibilities (AKV)

Read article
Teaser Image
09.02.2017| André Clerc | Presentation

About & Beyond PKI – Blockchain and PKI

Read article
Teaser Image
16.08.2016| Adrian Bachmann | Article

The EPR as a Litmus Test for Informational Self-Determination

Read article
Teaser Image
05.04.2016| Alex Rhomberg | Presentation

Cybersecurity Threat Defense

Read article
Teaser Image
10.03.2016| Thomas Kessler | Presentation

EPR threat and risk analysis

Read article
Teaser Image
10.03.2016| Daniel Felix Maurer | Presentation

ICT security management - the tension between business and technology

Read article
Teaser Image
25.09.2015| Adrian Bachmann | Article

Prevention, Detection and Response: Why Pure Prevention Is Not (or No Longer) Enough

Read article
Teaser Image
23.09.2015| Thomas Kessler et al. | Presentation

IAM Vision 2025 - IAM concepts beyond Role Based Access Control

Read article
Teaser Image
19.09.2013| Adrian Bachmann et al. | Presentation

Introduction of a role-based IAM - A practical report

Read article
Teaser Image
18.09.2012| Daniel Felix Maurer | Presentation

ISMS in the IT project approach - aspiration and reality

Read article