With more frequent and increasingly vicious cyberattacks, vulnerabilities in IT architecture pose a severe threat.
Cybersecurity today is not only a technical challenge but also a human challenge - a matter of security culture.
A cyberattack on oil and gas control systems can result in severe consequences to human safety and the environment in the form of ruptures, explosions, fires, releases and spills.
Ransomware attacks on municipalities and similar organisations are more frequent than ever.
Ransomware attacks are more frequent than ever. The attacks can block all computers, and thus access all digital communication, with the attacker demanding a huge ransom to unblock them.
Digitalisation is making information security an area that is becoming increasingly important.
Today, there are many suppliers of different information security solutions. But do you know how future-proof the solution you choose to invest in actually is?
The purpose of the NIS directive is for providers of essential services to work with risk-based security.
The NIS directive and, in some countries, stricter national security legislation impose new, higher requirements on companies within critical infrastructure in terms of information security.
Many organisations today have difficulties tracking and securing all data transfer channels that expose them to security threats.
The NIS directive was adopted in 2016 in EU and sets a range of network and information security requirements which apply to operators of essential services and digital service providers (DSPs).
The data intrusions are constantly increasing.
Digitalisation has given us a tool for instant global communication, the Internet.
What do you do to protect your organisation’s network and information flow? What solution do you use and depend on?
It’s no secret that organisations have physical assets that require protection.
Customers in the defence industry have strict requirements
Not everybody can be a producer for the defence industry.
Every day most of us work with several different systems. Through our computer and other digital devices we access information that is physically in a completely different place.
With a constantly more serious threat scenario, everyone today needs to be aware of the risk of a cyber attack and the consequences of insufficient security.
Jonas Dellenvall, CTO at Advenica, shares his view on the security year ahead of us.
Today, remote access is commonly used to connect with servers and networks at a distance. The functionality is there but the control is missing.
In today's digitalised world it is increasingly important to protect information.
“Confidential information must be considered breached”.
1. Quantum computers are becoming available to all
Quantum computers are by nature immensely faster than classical computers on making searches in data sets or factorizing large numbers.
Last week, Swedish television reported about a
Organisations are becoming more enlightened about the threats that cyberattacks provide.
There are many examples of companies and organisations that have paid a high price for a lack of information security, both financially and in terms of their reputation.
The legend of the Trojan War tells the story of how the Greeks tricked their opponents using a Trojan horse.
Three Domain Separation was originally developed by Advenica in connection to a high assurance project for the Swedish armed forces.
Calculating clear-cut network segmentation ROI can be tricky. It is a preventive investment, a vaccination against cyberattacks. Thinking it is unnecessary? Or waiting until it is too late?
The world is changing. Established truths just a few years ago are no longer relevant.
In today’s politically volatile and digitalised world, it’s more important than ever to protect critical information.
It’s scary how so many municipalities have such a low maturity and readiness to cope with cyber threats.
The Swedish government wants to tighten protection against espionage and tampering.
What’s the forecast for critical infrastructure? The "Weather Forecast" for critical infrastructure is that the perfect storm will be triggered in May 2018. Why just then?
One of today’s topics at Nato´s on-going cyber symposium in Mons, Begium, was interception possibility of fiber optic networks.
In February this year, Advenica was given the opportunity to lead and drive two technical specifications for Middlebox Security Protocols which is two of the new work items in the Cyber Security co
The policy brings forward four distinct scenarios, ranging from air gaps, through uni-directional import and export of information, to bi-directional information exchange.
It’s all about being relevant
Let’s face it.
Advenica has its background and core business within the National Security market segment, adressing Armed Forces and Government customers.