Skip to content

Cyber blog

From Cyber Risks To Building Resilience

Increasing cyber resilience requires investment and a change of attitude, where the security discussion focuses on solutions and resources instead of dwelling on threat images.

READ BLOG

Navigating the Future of OT Security with Fortinet

Rapid digital evolution is reshaping the way organizations must approach Operational Technology (OT) and security, presenting businesses with both challenges and opportunities. At the heart of this transformation is the ability to build a protective architecture that both scales with organizational needs and can adapt according to ever-evolving production requirements.

Read blog

Security in the cloud starts with people and with digital identities

As IT infrastructure, data, and the applications people use for work move to the cloud, security must also evolve. Security in the cloud era should be designed “people first”. Read on to find out why.

Read blog

From Risks to Resilience 

When high-consequence, low-probability events such as global pandemics and war materialises, our risk models governing information security and privacy tend to fail. Why is that? 

Read blog

Leadership in the Line of fire – Proactive vs Passive Cyber Defense in Healthcare

In the connected world of modern organisations, cyber risks are not just IT problems – they are leadership challenges. Every decision made by executives can have ripple effect across the organisation, also influencing its ability to withstand cyber threats.

Read blog

The Power of Cyber Threat Intelligence Feeds: A Deep Dive with Fitsec Ltd 

In the vast and ever-evolving world of cyber security, staying ahead of potential threats is not just a luxury—it’s a necessity. Cyber Threat Intelligence (CTI) has emerged as a crucial tool in this endeavour, with CTI feeds playing a pivotal role. 

Read blog

Insta Cyber security is key in securing the operability of production

Cyber security has become a highly relevant topic because of the geopolitical situation as the functionality of critical infrastructure directly affects the functional capacity and well-being of individuals. Finland is very dependent on power supply and functional logistics, among other things. In a connected society, there is also strong dependency between the different sectors. This all makes cybercrime one of the biggest future threats.

Read blog

Trend Micro – Stepping Ahead of Risk

Trend Micro’s 2023 midyear cybersecurity threat report, titled “Stepping Ahead of Risk”, emphasizes the importance of forward-looking mindset for cybersecurity professionals to predict and get ahead of cyber threats.

This is even more important now than ever before, as malicious actors are dynamically changing their attack methods (TTP’s) and targets, utilizing innovations like AI-based solutions to become more prolific and carry out the attacks more efficiently.

Read blog

Nixu – The importance of the Digital Realm for Resilience

According to a senior cybersecurity official from Finland’s National Cyber Security Centre, ransomware attacks targeting Finnish organizations have increased four-fold since Finland began the process of joining NATO. But thanks to good preparedness, most attacks failed. Organizations that are careful and build up their resilience systematically keep their feet dry even when unexpected events happen.

Read blog

Accenture – NIS2 and DORA: aiming at strengthening resilience

We are in a time where there is still an ongoing and intense digital transformation for many businesses. The war in Ukraine, the territorial disputes in the south China sea, and the fierce economic and dominance competition between the USA and China are all examples that have a direct impact on the world’s stability and security through the cyber space. In that context, it is even more relevant to protect this digitalization and secure the resilience of the provisioned critical services.

Read blog

YesWeHack – 7 bug bounty misconceptions dispelled

Organisations sometimes express ill-founded concerns about the challenges and drawbacks of bug bounty programs.  This crowdsourced security model, where ethical hackers earn financial rewards (bug bounties) for unearthing valid vulnerabilities in specific digital assets, are an increasingly popular alternative to penetration testing.

In this article we’ll bust some prevalent misconceptions about bug bounty, which arise from a failure to recognise the flexible, cost-effective and platform-driven nature of managed bug bounty programs.

Read blog

Bureau Veritas – Significance of Cybersecurity Certifications

Information, like other important business resources, brings added value to the organization and therefore it should be properly protected. However, in today’s technology-dependent world, the risk of data security breaches is increasing. One incident can destroy a company’s image, affect business continuity and income, and endanger the customer base. That’s why more and more organizations are seeing the value of a structured approach to information security, such as ISO 27001 and GDPR certifications for managing the information security of control and management systems.

Read blog

Bittium – A Secure Smartphone in Uncertain Times

Smartphones are currently one of the main channels for the potential leakage of sensitive data. At Bittium, we realize that an unsecured smartphone in the hands of an unaware company employee or official can be an excellent tool for infiltrating the organization’s resources or for disinformation activities (e.g. through hijacked accounts on social networking sites).

Read blog

Huawei Navigating the Complex Landscape of Cyber Security: A Shared Responsibility.

Over the past few years, a succession of critical vulnerabilities, supply chain attacks, and advanced persistent threats (APTs) have emerged. Cyber security threats have become ubiquitous, arising in products and services, operations, internal IT systems, supply chains, code, and personnel. Governments around the world are paying greater attention to cyber security, and have adopted laws and regulations to strengthen the governance of cyberspace.

Read blog

Huld – Security is not only an attribute of quality 

According to the Finnish Security and Intelligence Service (SUPO) and the Finnish Transport and Communications Agency (Traficom), Russia has targeted increasingly cyber-attacks to Finland. Organizations like Wärtsilä, Uponor and the Finnish News Agency (STT) have reported that cyber-attacks have become almost daily routine.

Read blog

2NS – Getting ready for NIS2 compliancy and assessing supply chain security

European Parliament approved the new cybersecurity directive NIS2 at the end of 2022. This means that companies have until 16th of October 2024 to become compliant with the new directive. NIS2 has much broader scope than the first NIS-directive and the new directive enforces companies to do more regarding cybersecurity than before.

Read blog

Netum – Penetration testing helps in assessing the level of information security 

Penetration testing helps in assessing the level of information security. Several different methods are used to assess the level of information security of a certain system or a customer’s ICT environment. The attack surface of the environment is analyzed with technical tools (such as a vulnerability scanner) using techniques based on open source intelligence and by interviewing the customer’s responsible persons.

Read blog

CrowdStrike – Cloud Exploitation Is Up 95%. What Should You Do About It?  

Over the past several years, organisations have taken tremendous steps to adopt cloud services and infrastructure, transforming the way business is done.  And as our recent data shows, threat actors have done the same.  Observed cloud exploitation cases grew by 95% in 2022, according to CrowdStrike’s latest Global Threat Report.

Read blog

Cyber resilience is a shared priority

Maintaining and developing cyber resilience is more important than ever in the rapidly evolving security environment. As there’s no such thing as watertight cyber security, in addition to preventive protection, we must also develop organizational abilities to anticipate, prepare for and recover from potential cyberattacks.

Read blog