Use data diodes to protect information in critical infrastructure
Data Diodes are the failsafe way to protect your sensitive systems and confidential data.
How to Conduct Secure Updates
Conducting updates is something that can be a security risk if not done properly. Learn how to conduct secure updates in this blog post!
Protect your SCADA Environment from Weaknesses
Vulnerabilities in protocol gateways can result in serious cybersecurity attacks. The right solutions are needed to secure your SCADA environment.
Data diodes raise cybersecurity for banks
Segmentation using data diodes is an essential measure to mitigate security risks for banks
Why Vienna chose Advenica’s Data Diodes to protect its energy infrastructure
Read our customer case and learn how Wiener Netze in Vienna uses Advenica’s Data Diodes for protection
Secure information management for ICS systems
Secure information management for ICS systems is one of the most challenging areas for companies using them.
How to do a secure transfer of SCADA information
The processes that SCADA systems control, and monitor are often of very sensitive nature - and special solutions are needed to get a secure transfer.
Security in a future of IoT based on 5G
How does security work In a future of IoT in a 5G world? Here are some important things to consider.
Cybersecurity trends for 2020
We have noted a few trends within cybersecurity for 2020 that we want to share.
How to get started with information security work?
The digital world places new, higher demands on information security. Do you know how to start working with information security?
How the energy sector can secure power and a functioning society
With more frequent and increasingly vicious cyberattacks, vulnerabilities in IT architecture pose a severe threat.
Security culture - an important part of cybersecurity
Cybersecurity today is not only a technical challenge but also a human challenge - a matter of security culture.
Lack of cybersecurity awareness in the oil & gas industry – a major risk for the environment
A cyberattack on oil and gas control systems can result in severe consequences to human safety and the environment.
How municipalities keep citizens’ integrity and privacy safe
The only way to protect digital communication and not fall victim to these attacks is to work with cybersecurity in a consistent and structured way.
Information security compliance – five business benefits
Information security compliance brings significant benefits to you and your business!
How you secure the management's commitment to information security
Here are a few things you should bring to a presentation for the management regarding information security.
Is your security solution future-proof?
Do you know how future-proof the solution you choose to invest in actually is? Who is responsible if your solution is hacked in a few years?
The NIS directive - we can help you comply
How is the NIS work progressing in your organisation? Have you started to work for compliance with all the requirements?
How does your organisation secure information security in ICS and SCADA systems?
How to ensure information security while maintaining the accessibility and integrity of the systems?
Know how to do secure file transfer to classified networks?
We have a solution that provides strong protection for file transfers.
Feel in control regarding the NIS directive?
Do you know how to work systematically with information security?
Is your organisation protected from being hacked?
The data intrusions are constantly increasing. Does your organisation have the right protection?
Cyber-attacks – part of our everyday lives
Advanced cyber-attacks from various directions, even from state attackers in other countries, are today unfortunately part of our everyday life.
When a firewall is not enough
What do you do to protect your organisation’s network and information flow? What solution do you use and depend on?
What is a data diode and how does it work?
A data diode is a cybersecurity solution that makes sure that information can only travel in one direction.
The defence needs trusted cybersecurity solutions – do you?
The defence industry requires high assurance solutions - Every step in the development, from design to the aftermarket, must be controlled to ensure this
Maintain security, even when working remotely!
How do you ensure that remote access does not open more possible attack vectors for a potential attacker?
Four reasons to invest in future-proof solutions today
For those of you responsible for critical infrastructure, we have compiled some talking points so you can make responsible and sustainable decisions.
The cyber year of 2019 and what’s to come
Jonas Dellenvall, CTO at Advenica, shares his view on the security year ahead of us.
Five steps to controlled remote access with RDP
We give you 5 steps to take control over remote access
Are you protecting the right things?
Protecting all the information flow in a company today at the same level is not possible - so how to do it right?
All clouds are not made equal – five questions to ask your cloud service provider
Is cloud service secure? Here five questions to ask your cloud service provider.
Five key facts in the Quantum Age
Quantum computers and quantum technology is coming - here five key facts in the quantum age.
What was the target of the water station break-in?
What if the target was not the water, but the IT systems, at the break-in at a water station?
Can we trust what we “know” about cybersecurity?
When misconceptions (or rather myths) about cybersecurity are circulating freely, how do we know what to trust?
Are we taking cybersecurity seriously enough?
So how is it that we believe we know all about cybersecurity? Are we just being naïve?
The story of the Trojan Horse from an IT security perspective
The legend of the Trojan horse - and a parallel to existing problems with modern technology for IT security.
Eliminate insider threats and data leakage once and for all
Three Domain Separation is a unique technique enabling centralised control with no risk of administrators gaining access to business critical information.
Network segmentation – fundamental for information security
Why is network segmentation required?
Today's security situation requires a military cyber approach
An increasing number of businesses need the kind of effective protection previously only used by defense forces and intelligence agencies
Cybersecurity challenges in 2018
Advenica’s CTO Jonas Dellenvall and CEO Einar Lindquist talk about what’s happening in cybersecurity in 2018.
Low maturity and readiness to cope with cyber threats
It’s scary how so many municipalities have such a low maturity and readiness to cope with cyber threats.
A government proposal we welcome
Advenica welcomes the government's proposal to expand society's requirements to include private businesses.
Advenica presents Cross Domain Solutions to the EU Council Security Committee
On Wednesday 29th March, Advenica presented Cross Domain Solutions to the EU Council Security Committee, with focus on the SecuriCDS ZoneGuard, as a way to resolving the requirements in the Information Assurance Security Policy on Interconnection (6488/15).