<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2171572209666742&amp;ev=PageView&amp;noscript=1">

Blog

The latest at Adnovum

Digital Innovation Public Sector SSI

Swiss E-ID Update: Know What Is Next

The Swiss e-ID tackled a major obstacle in early September with its overwhelming approval by the Council of States. However, this was not the final chapter of ...

A young woman standing at a desk and typing code into a computer
Digital Innovation Machine Learning (ML) Conversational AI

AIOps – A Powerful Tool off the GenAI Hype Radar

People in software engineering who speak of AI are usually referring to code assistants. When it comes to the verification and operation of software and ...

Image of a business professional in discussion about digital solutions with other workers
Cybersecurity Governance and Compliance

The Role of IT Governance and Compliance in Cybersecurity

The Role of IT Governance and Compliance in Cybersecurity Effective IT governance and compliance are crucial for businesses to protect against cybersecurity...

Janina Okle sitting in an armchair
People Women move IT

Janina's Vision: A Finely Tuned Interplay between Client and Project Manager

Janina Okle is a passionate project manager and has been Head of Project Management since June 1, 2024. This newly created role sees her responsible for the 18 ...

Portrait of Stefan Dydak, Head of Security Consulting at Adnovum
Cybersecurity Digital Solutions Digital Identities (IAM)

Cybersecurity: Addressing the Key Points

Cybersecurity is currently one of the most crucial topics in the IT world. However, it has become difficult even for experts to find their way through the ...

Cybersecurity Digital Solutions Digital Identities (IAM)

What Is Digital Identity Management and How Do You Master It?

Digital identities are a core element of an organization’s DNA. With digital transformation gaining even more momentum, their protection is an absolute must. ...

Consulting Cybersecurity Cloud Security

The Hidden Risks of Unmonitored IoT Devices

The Internet of Things (IoT) revolution is transforming businesses across all industries. From smart thermostats optimizing energy usage to security cameras...

a customer scanning QR code for payment
Consulting Cybersecurity Digital Innovation

CIAM: Orchestrating a Secure and Frictionless Cloud Journey for Exponential Growth

The digital landscape is rapidly expanding, with customers demanding seamless and secure interactions across a plethora of cloud platforms. Traditional...

Businessman Working On Laptop
Cybersecurity Cloud Security

Securing the Cloud: Cutting-Edge Cloud Concepts to Protect Digital Assets

The cloud revolutionized how businesses operate, offering on-demand scalability and seamless access to IT infrastructure. However, this agility comes with...

Placeholder