[{"data":1,"prerenderedAt":360},["Reactive",2],{"menuQuery_en":3,"settingsQuery_en":188,"routerQuery_/insights/ioc-ioa-and-iof-what-indictors-really-mean_en":194,"viewQueryInsight_en":259},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Â̲èÖ±²¥",{"__typename":13,"path":14},"Url","/en/competencies",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/en/competencies/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/en/competencies/cloud",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/en/competencies/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/en/competencies/digital-identity",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/en/competencies/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/en/competencies/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"Solutions",{"__typename":13,"path":49},"/en/solutions",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/en/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communities",{"__typename":13,"path":59},"/en/community",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/en/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"About us",{"__typename":13,"path":69},"/en/about-us",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Our foundation",{"__typename":13,"path":74},"/en/about/our-foundation",[],{"__typename":10,"title":77,"url":78,"children":80},"Higher education policy",{"__typename":13,"path":79},"/en/higher-education-policy",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovation",{"__typename":13,"path":84},"/en/about/innovation",[],{"__typename":10,"title":87,"url":88,"children":90},"Collaborations ",{"__typename":13,"path":89},"/en/Collaborations-international",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/en/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Contact us",{"__typename":13,"path":99},"/en/contact-us",[],{"__typename":6,"name":102,"items":103},"Footer Column 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Column 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/en/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Column 3 (External Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Data protection",{"__typename":13,"path":174},"/en/data-protection",[],{"__typename":10,"title":177,"url":178,"children":180},"Imprint",{"__typename":13,"path":179},"/en/imprint",[],{"__typename":10,"title":182,"url":183,"children":185},"Legal notice",{"__typename":13,"path":184},"/en/legal-notice",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","Â̲èÖ±²¥","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":215,"seo_information":216,"content_elements":220,"lead":218,"date_published":226,"og_image":227,"image":230,"topics":241,"blog_view":244,"insight_author":253,"insights_overview_page":215},"BlogDetailpage","475aa94a-75c3-4254-85fd-2aa467c02859",462,"IoC, IoA and IoF: What indictors really mean","en",[205,209,212],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/insights/ioc-ioa-and-iof-what-indictors-really-mean",{"__typename":206,"language_id":210,"url":211},"DE","/de/insights/ioc-ioa-und-iof-was-indikatoren-wirklich-bedeuten",{"__typename":206,"language_id":213,"url":214},"FR","/fr/insights/ioc-ioa-et-iof-ce-que-signifient-reellement-ces-indicateurs",null,{"__typename":217,"meta_description":218,"meta_name_robots":193,"canonical":208,"page_title":219,"keywords":193,"hreflang":203},"SeoInformation","When I started working in threat hunting years ago, I noticed right from the start – and I’ve seen others struggle with it too – how we label indicators. Not all indicators are IoCs, and it’s time we classified them according to their type.","IoC, IoA and IoF: What indictors really mean | Â̲èÖ±²¥",[221],{"__typename":222,"_id":223,"paragraph_id":224,"title":215,"text":225},"TextItem","3b976282-492e-41ca-83f3-e9a689d46a9d",3209,"\u003Cp>The terms Indicator of Attack (IoA), Indicator of Compromise (IoC), and Indicator of Fraud (IoF) can get confusing. It is not always clear how they are different or when to use which. So, let’s break them down and make sense of what each one means, how they work, and which ones matter most for keeping an organization safe.\u003C/p>\u003Cp>At Â̲èÖ±²¥â€™s Security Operations Centre, we use SIEM (Security Information and Event Management) solutions to check whether reported IoCs appear in our customers’ environments. Since attackers quickly change IP addresses, domain names, or URLs, we also focus on IoAs, which remain relevant for longer and help us detect threats even when their infrastructure shifts.\u003C/p>\u003Ch4>IoAs – Indicators of Attack\u003C/h4>\u003Cp>IoAs are early warning signs, such as unexpected traffic spikes, suspicious logins, or abnormal user behaviour. They reveal active cyber threats before they escalate. Unlike IoCs, which focus on forensic evidence after a breach has occurred, IoAs detect malicious intent in real time, exposing the \"why\" behind attacks.\u003C/p>\u003Cp>This proactive approach shifts the security focus from responding to damage to disrupting threats mid-action. By continuously analysing system logs, attacker tactics, techniques, and procedures (TTPs), and behavioural anomalies, teams can neutralise risks before they cause any harm. For example, some IoA detections can include:\u003C/p>\u003Col>\u003Cli>\u003Cstrong>Renamed tools\u003C/strong>\u003Cbr>Critical tools such as PowerShell can be misused by attackers by renaming its executable file to hide their actions, avoiding default detections based on paths or commands and ultimately deliver their threats.\u003C/li>\u003Cli>\u003Cstrong>Excessive SMTP traffic\u003C/strong>\u003Cbr>Attackers may attempt to spread malware, steal sensitive information using a man-in-the-middle attack, launch a DDoS attack, or misuse a company server to send spam and run phishing scams. A detection of this IoA can be based on a general analysis of an unusually high volume of SMTP traffic.\u003C/li>\u003Cli>\u003Cstrong>Unusual process execution\u003C/strong>\u003Cbr>Attackers often use legitimate system tools, such as PowerShell, CMD, MSHTA, or WMIC, to carry out malicious operations. These tools are built into the OS and trusted by security controls, making them ideal for bypassing defences and being used for:\u003Cbr>–  execution of payloads using base64-encoded commands\u003Cbr>–  obfuscated or suspicious commands in process lines (e.g. mshta, rundll32)\u003Cbr>–  use of trusted tools to download or execute remote scripts\u003C/li>\u003Cli>\u003Cstrong>Command and control (C2) communication\u003C/strong>\u003Cbr>Malware communicating with external servers controlled by attackers. Uncommon ports, encrypted traffic or repeatedly failed DNS lookups can be indicators to identify a potential attack.\u003C/li>\u003C/ol>\u003Ch4>IoCs – Indicators of Compromise\u003C/h4>\u003Cp>An IoC is a data artifact or an observable characteristic that suggests a system or network has been compromised or that malicious activity has occurred.\u003Cbr>IoCs can include file hashes, IP addresses, domain names, registry changes, process anomalies, or behavioural signatures that correlate with known threats. They are typically used in forensic analysis, threat hunting, and automated detection workflows to identify, trace, and respond to security incidents post-compromise.\u003C/p>\u003Col>\u003Cli>\u003Cstrong>File hashes\u003C/strong>\u003Cbr>File hashes are unique digital fingerprints of files (e.g., MD5 or SHA256) which can be used to identify known malware or suspicious files. These hashes serve as IoCs that can be cross-referenced with threat intelligence feeds to identify file-based threats across environments.\u003C/li>\u003Cli>\u003Cstrong>Malicious IP addresses\u003C/strong>\u003Cbr>Malicious IP addresses are IoCs linked to phishing, malware delivery, or command-and-control infrastructure. Communication with these IP addresses often indicates a compromised user or system.\u003C/li>\u003Cli>\u003Cstrong>Domain names and URLs\u003C/strong>\u003Cbr>Domain names and URLs are among the most common IoCs used to detect and investigate malicious activity. They represent hostnames (e.g. evil-site.com) or full web addresses (e.g. http://evil-site.com/payload.exe) that are involved in:\u003Cbr>–  phishing campaigns (e.g., fake login pages)\u003Cbr>–  malware distribution (e.g., links to malicious payloads)\u003Cbr>–  command and control (C2) communication (e.g. backdoors or RATs, remote access trojans)\u003Cbr>–  initial access brokers and exploit delivery\u003C/li>\u003Cli>\u003Cstrong>Registry keys\u003C/strong>\u003Cbr>Windows registry keys are critical system configurations stored in a hierarchical database used by the Windows OS and applications. Malicious actors often target or manipulate specific registry keys to:\u003Cbr>–  achieve persistence (e.g., run malware at startup)\u003Cbr>–  disable security features (e.g., real-time protection or MAPS, Microsoft Advanced Protection Service)\u003Cbr>–  modify system behaviour for stealth or privilege escalation\u003Cbr>Inspecting critical registry keys is essential for detecting potential manipulation and enabling a timely response before an attack can progress.\u003C/li>\u003C/ol>\u003Ch4>IoFs – Indicators of Fraud\u003C/h4>\u003Cp>IoFs are warning signs that someone may be tricking a system for financial gain. While they can overlap with cybersecurity issues like malware, fraud indicators usually focus on actions that seem dishonest or unusual – especially involving money. Examples include:\u003C/p>\u003Col>\u003Cli>\u003Cstrong>Systems logs and alerts: Audit log irregularities\u003C/strong>\u003Cbr>These can reveal audit log tampering, unauthorised access attempts, or suspicious configuration changes. An effective way to detect these indicators is to monitor Windows Security Event Logs and associated actions. Associated threats include:\u003Cbr>–  Loss of non-reputation evidence\u003Cbr>–  Lack of visibility over malicious activities\u003Cbr>–  Regulatory non-compliance\u003C/li>\u003Cli>\u003Cstrong>Phishing attempts\u003C/strong>\u003Cbr>Do not interact with unexpected links, email attachments, or suspicious OTP messages from unknown sources. They may contain malware designed to steal your personal or financial information. \u003Cbr>For example, if you start receiving emails from an ASN that hasn’t communicated with you for the last three months, and these emails are flagged as threats originating from distinct IP addresses, this may justify classifying the ASN as a potential IoF.\u003C/li>\u003Cli>\u003Cstrong>Suspicious user behaviour\u003C/strong>\u003Cbr>Fraud can be detected through unusual activity, such as sudden changes to phone numbers or email addresses, unexpected transaction requests or multiple successful sign-ins from distant countries on the same day. These activities often point to an account compromise or an identity theft. In this case, a useful detection can be to find cases where the user successfully logs in from countries that are far apart on the same day.\u003C/li>\u003C/ol>\u003Ch4>Summary\u003C/h4>\u003Cp>The article clarifies the differences between:\u003C/p>\u003Cul>\u003Cli>IoAs – Indicators of Attack: Signs that an attack is happening or imminent.\u003C/li>\u003Cli>IoCs – Indicators of Compromise: Evidence of past attacks.\u003C/li>\u003Cli>IoFs – Indicators of Fraud: Suspicious behaviour aimed at financial or identity manipulation.\u003C/li>\u003C/ul>\u003Cp>Illustrative examples:\u003C/p>\u003Cul>\u003Cli>IoAs: PowerShell misuse, excessive SMTP traffic or base64-encoded commands.\u003C/li>\u003Cli>IoCs: File hashes, malicious IP addresses, domain names and URLs or registry changes.\u003C/li>\u003Cli>IoFs: Sudden changes in user behaviour, OTP scams, or logins from widely separated locations in short periods.\u003C/li>\u003C/ul>\u003Cp>For each type of indicator, the article shares practical detection strategies and ex-plains their real-life relevance. It encourages threat hunters to move beyond static detections (IoCs) and proactively identity attacker behaviours and fraud before damage is caused.\u003C/p>","15. October 2025",{"__typename":228,"fallback":229},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-10/ioa-ioc-iof_en.png?itok=xkRR6X27",{"__typename":228,"src":229,"sources":231,"width":236,"height":237,"alt":238,"type":239,"caption":240},[232],{"__typename":233,"src":234,"media":215,"sizes":235},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-10/ioa-ioc-iof_en.png?itok=xkRR6X27 400w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-10/ioa-ioc-iof_en.png?itok=7uPYJyTl 608w, https://static.www.switch.ch/sites/default/files/styles/image_large_16_9/public/2025-10/ioa-ioc-iof_en.png?itok=FDFatBF3 1024w, https://static.www.switch.ch/sites/default/files/styles/hero_large_16_9/public/2025-10/ioa-ioc-iof_en.png?itok=mel2seVU 1600w","100vw",2539,1443,"Table describing the difference between the terms Indicator of Attack (IoA), Indicator of Compromise (IoC), and Indicator of Fraud (IoF) ","image/png","Not every indicator is an Indicator of Compromise. Illustration: Â̲èÖ±²¥",[242],{"__typename":243,"name":17},"TaxonomyTerm",{"__typename":245,"view_id":246,"display_id":247,"pager":248},"View","blog","blog_releated_articles",{"__typename":249,"items_per_page":250,"pager_type":251,"total_pages":252},"ViewsPager",3,"some",0,[254],{"__typename":255,"title":256,"job_title":257,"organisation":192,"image":215,"url":258},"InsightAuthor","Sergio Garcia Albea","Security Engineer","/en/sergio-garcia-albea",{"data":260,"loading":186,"networkStatus":187},{"view":261},{"__typename":245,"view_id":246,"field_settings":215,"result_count":250,"pager":262,"result":263},{"__typename":249,"items_per_page":250,"pager_type":251,"total_pages":252},[264,282,297,311,328,344],{"__typename":199,"nid":265,"url":266,"teaser_title":267,"teaser_image":268,"topics":279},461,"/en/insights/milestone-digital-mobility-swiss-education-area","A milestone for digital mobility in the Swiss Education Area",{"__typename":228,"src":269,"sources":270,"width":274,"height":275,"alt":276,"type":277,"caption":278},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/e-id_header_de.jpg?itok=Rcza_tTJ",[271],{"__typename":233,"src":272,"media":215,"sizes":273},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/e-id_header_de.jpg?itok=Rcza_tTJ 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-09/e-id_header_de.jpg?itok=OhLawvUC 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-09/e-id_header_de.jpg?itok=xDanDcxa 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-09/e-id_header_de.jpg?itok=ocpToRCE 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-09/e-id_header_de.jpg?itok=vMJcXgjr 816w","(min-width:600px) 20vw, 65vw.",2754,1551,"A person presents a digital and physical ID card.","image/jpeg","The e-ID is the digital form of an ID card. Photo: eid.admin.ch",[280],{"__typename":243,"name":32,"id":281},4,{"__typename":199,"nid":283,"url":284,"teaser_title":285,"teaser_image":286,"topics":295},460,"/en/insights/switch-cloud-helps-transform-cancer-care","Â̲èÖ±²¥ Cloud helps transform cancer care",{"__typename":228,"src":287,"sources":288,"width":291,"height":292,"alt":293,"type":277,"caption":294},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/istock-naipo.jpg?itok=Lqyk76HM",[289],{"__typename":233,"src":290,"media":215,"sizes":273},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/istock-naipo.jpg?itok=Lqyk76HM 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-09/istock-naipo.jpg?itok=bfvH_L2F 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-09/istock-naipo.jpg?itok=rEAcCj2n 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-09/istock-naipo.jpg?itok=hReW_H-H 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-09/istock-naipo.jpg?itok=ZCPKY3m8 816w",1411,744,"Two scientists discuss an x-ray of a patient","Source: iStock | gorodenkoff",[296],{"__typename":243,"name":22,"id":250},{"__typename":199,"nid":298,"url":299,"teaser_title":300,"teaser_image":301,"topics":310},459,"/en/insights/switch-and-educa-whats-next-digital-identities","Â̲èÖ±²¥ and Educa: What’s next with digital identities?",{"__typename":228,"src":302,"sources":303,"width":306,"height":307,"alt":308,"type":277,"caption":309},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/250903-educa_fachtagung_0059.jpg?itok=AcnVh7aT",[304],{"__typename":233,"src":305,"media":215,"sizes":273},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/250903-educa_fachtagung_0059.jpg?itok=AcnVh7aT 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-09/250903-educa_fachtagung_0059.jpg?itok=V_ZHFBUl 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-09/250903-educa_fachtagung_0059.jpg?itok=lFCUhbfj 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-09/250903-educa_fachtagung_0059.jpg?itok=Xb2Y8aNC 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-09/250903-educa_fachtagung_0059.jpg?itok=TBVPX1f_ 816w",5640,3172,"Photo montrant Christoph Graf de Â̲èÖ±²¥ et Andreas Klausing d'Educa, en pleine conversation.","Christoph Graf de Â̲èÖ±²¥ et Andreas Klausing d'Educa. Photo: Marion Bernet Photography",[280],{"__typename":199,"nid":312,"url":313,"teaser_title":314,"teaser_image":315,"topics":324},458,"/en/insights/four-young-talents-final-nextgen-hero-award","Four young talents in the final for the NextGen Hero Award",{"__typename":228,"src":316,"sources":317,"width":320,"height":321,"alt":322,"type":277,"caption":323},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/web_rrim_250904_swissict_dea_57662-990000079e04513c.jpg?itok=igxVpfoJ",[318],{"__typename":233,"src":319,"media":215,"sizes":273},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/web_rrim_250904_swissict_dea_57662-990000079e04513c.jpg?itok=igxVpfoJ 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-09/web_rrim_250904_swissict_dea_57662-990000079e04513c.jpg?itok=WHnRaPpB 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-09/web_rrim_250904_swissict_dea_57662-990000079e04513c.jpg?itok=OSnPnRLh 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-09/web_rrim_250904_swissict_dea_57662-990000079e04513c.jpg?itok=zIDth2Rj 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-09/web_rrim_250904_swissict_dea_57662-990000079e04513c.jpg?itok=tPwqanwm 816w",900,601,"Group photo showing 18 men and women finalists of the Digital Economy Award 2025","Twenty organizations and nine individuals are in the final round of the Digital Economy Awards 2025 in five categories. Among them are four young talents in the 'NextGen Hero' category. Photo: DEA",[325],{"__typename":243,"name":326,"id":327},"Corporate",21,{"__typename":199,"nid":329,"url":330,"teaser_title":331,"teaser_image":332,"topics":341},454,"/en/insights/joint-audits-successful-model-cctld-registries","Joint audits: The successful model of ccTLD registries",{"__typename":228,"src":333,"sources":334,"width":337,"height":338,"alt":339,"type":277,"caption":340},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/adobestock_1339030835.jpeg?itok=uLfTc7FL",[335],{"__typename":233,"src":336,"media":215,"sizes":273},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-09/adobestock_1339030835.jpeg?itok=uLfTc7FL 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-09/adobestock_1339030835.jpeg?itok=XwicPkgM 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-09/adobestock_1339030835.jpeg?itok=uNGkL8nA 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-09/adobestock_1339030835.jpeg?itok=7BX21oZE 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-09/adobestock_1339030835.jpeg?itok=b3GhCn3D 816w",2000,1125,"Stock photo showing the review of ISO certification standards with digital icons representing quality control","Photo: Adobe Stock | Bird Photographer TH",[342],{"__typename":243,"name":37,"id":343},19,{"__typename":199,"nid":345,"url":346,"teaser_title":347,"teaser_image":348,"topics":357},452,"/en/insights/michael-hausding-remains-first-board","Michael Hausding remains on the FIRST board",{"__typename":228,"src":349,"sources":350,"width":353,"height":354,"alt":355,"type":277,"caption":356},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-08/Michael-Hausding-SWITCH.jpg?itok=zJOptTHw",[351],{"__typename":233,"src":352,"media":215,"sizes":273},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-08/Michael-Hausding-SWITCH.jpg?itok=zJOptTHw 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-08/Michael-Hausding-SWITCH.jpg?itok=82I7fGx1 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-08/Michael-Hausding-SWITCH.jpg?itok=pR6FoPOa 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-08/Michael-Hausding-SWITCH.jpg?itok=1xCaO5n4 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-08/Michael-Hausding-SWITCH.jpg?itok=Z4juHHuU 816w",2500,1667,"Portrait photo of Michael Hausding","Michael Hausding, cyber security expert at the Â̲èÖ±²¥ CERT computer emergency response team.",[358,342],{"__typename":243,"name":17,"id":359},2,1761595850764]