
Raise information security – contribute to a safer world
Sign up to future blog posts through our newsletter

2022-06-28
- Secure digitalisation
How management can organise their business to avoid cyberattacks
In this blog post, we have listed a few things to consider to be able to avoid being affected by cyberattacks!

2022-06-14
- Digital responsibility
Lack of competence in cybersecurity - a matter for management
The need for competencies and competence in cybersecurity is constantly increasing. But, there is a shortage of competence.

2022-06-01
- Secure digitalisation
Is your network isolation leaking?
What if there was a leak in the network that you thought was isolated? Information security is more important than ever and requires structured work.

2022-05-18
- Critical Infrastructure
How can energy companies become less vulnerable?
With more frequent and increasingly vicious cyberattacks, vulnerabilities in IT architecture pose a severe threat for energy companies.

2022-05-04
- Secure digitalisation
5 tips for how you better can protect yourself against cyberattacks
In this blog post, we describe 5 important tips you should be aware of to better protect yourself against cyberattacks!

2022-04-20
- Digital responsibility
Why CISOs should work with Cyber Risk Quantification (CRQ)
Cyberattacks are constantly increasing. Because of this, there is an increasing need for cyber risks to be measured and reported in financial terms.

2022-04-06
- Corporate
Retailers new targets for cyberattacks
Many recent cyberattacks have been targeted at retailers who are becoming increasingly more vulnerable.

2022-02-09
- Cross Domain Solutions
Log4j and Log4Shell – how can you protect yourself?
In December 2021, a vulnerability was found in the Java module Log4j. There are ways to protect yourself against this type of vulnerability!

2022-01-26
- Cross Domain Solutions
What is the best way to protect your network?
We explain the functionalities of three solutions that can protect your network, so that you can better understand what might be the best one for you!

2021-12-07
- IT/OT integration
This is why you base your zoning on risk analysis
In this text, we explain in detail what is important to keep in mind when basing your zoning on risk analysis according to IEC 62443.

2021-11-23
- Secure digitalisation
IIoT and Industry 4.0 security challenges
To avoid the risk of opening up for cyberattacks, industries and enterprises adopting IIoT have to increase the level of protection.

2021-11-09
- Secure digitalisation
The security risks the CISO needs to be aware of
A CISO needs to be aware of a lot to avoid that the vulnerabilities are exploited for a cyberattack. We describe six security risks that you should be aware of!

2021-10-20
- Compliance
A stricter Protective Security Act: 3 things the CISO needs to consider
The new, stricter Protective Security Act will enter into force on December 1st 2021, if the proposal passes. The CISO needs to be prepared!

2021-10-05
- Corporate
CISO – How you make sure that the management team prioritises cybersecurity
It is not always easy for the CISO to explain to the management team why working with cybersecurity is so important. Here are some things to keep in mind!

2021-09-22
- Critical Infrastructure
IEC 62443 – a standard you should know if you work with security in ICS systems
We explain what the standard IEC 62443 covers and what you need to think about if you want to follow it!

2021-08-18
- IT/OT integration
Securely integrate IT/OT – learn how to do it step by step!
We have listed 5 steps for how to securely integrate IT/OT. The method is based on the standard IEC 62443 – a must for those who work with security within OT.

2021-08-04
- Corporate
How insurance companies protect critical and personal information
It is highly necessary that insurance companies protect critical and personal information with appropriate cybersecurity solutions.

2021-07-09
- Digital responsibility
Security expert: How to handle the old and new threat of a software attack
Sami Hyytiäinen, technical expert, explains how to handle a software attack and how secure updates can be managed with the right solutions.

2021-07-07
- Corporate
- Critical Infrastructure
2 important pieces of advice on how society can become less vulnerable to IT attacks
Media has been flooded with news of IT attacks affecting large sections of society - we give some piece of advice on how the attack could have been limited.

2021-06-16
- IT/OT integration
How the process industry can handle today’s security threats
The process industry is regularly subjected to attacks – therefore, we have gathered some advice on how the process industry can protect their control systems.

2021-05-26
- Secure digitalisation
5 things about cybersecurity you have not thought about
We present 5 things about cybersecurity that you might not have thought about, that will give you an advantage when working with cybersecurity!

2021-05-12
- Secure digitalisation
Why invest in cybersecurity?
The reasons to invest in cybersecurity vary from organisation to organisation. What matters is that you know the level of protection your organisation needs!

2021-04-28
- Cross Domain Solutions
Why you should secure your network with more than a firewall
In order to protect what is most sensitive and critical to operations, you should secure your network with more than a firewall!

2021-03-24
- IT/OT integration
Increase security for your OT systems
Since the information in OT systems is very important for the company that uses the system, and sometimes important for the whole society, it must be protected.

2021-03-10
- Network segmentation
How to work with network segmentation using zoning
We have defined 5 steps for network segmentation using zoning, and hope that these can guide you and help create a successful project!

2021-02-24
- Secure digitalisation
How to make your data center secure with cybersecurity solutions
It can be a challenge to run and operate data centers. There are a number of threats that need to be mitigated with the right security solutions.

2021-02-10
- Compliance
New proposed directive - NIS 2
There is a proposal for a new directive which originates from the NIS directive – this new proposed directive is called NIS 2.

2021-01-27
- Secure digitalisation
How do we acquire high assurance?
It is difficult to measure security - this is the reason why we prefer to talk about assurance, rather than security.

2021-01-20
- Corporate
Protecting Banks’ Sensitive Information
Cyberattacks are a constant threat to organisations - for banks, it is important to have in mind as they handle sensitive information.

2021-01-13
- Digital responsibility
The 5 Most Increasing Types of Cyber Threats
A report by the European Union Agency for Cybersecurity (ENISA) shows that five different cyber threats in particular are increasing in Europe.

2020-12-02
- Cross Domain Solutions
How you can easily ensure one-way communication between two networks
Many networks require extra protection against tampering and data leakage. In these cases, a data diode can be very useful!

2020-11-04
- Network segmentation
How to Use Network Segmentation to Follow Proposed Regulations Concerning Information Security for Water Suppliers
There is now a proposal for mandatory adjustments in Livsmedelsverket’s regulations on information security for socially important services.

2020-10-21
- Critical Infrastructure
Use data diodes to protect information in critical infrastructure
Data Diodes are the failsafe way to protect your sensitive systems and confidential data.

2020-10-07
- Secure digitalisation
How to Conduct Secure Updates
Conducting updates is something that can be a security risk if not done properly. Learn how to conduct secure updates in this blog post!

2020-09-22
- Critical Infrastructure
Protect your SCADA Environment from Weaknesses
Vulnerabilities in protocol gateways can result in serious cybersecurity attacks. The right solutions are needed to secure your SCADA environment.

2020-09-09
- Cross Domain Solutions
Data diodes raise cybersecurity for banks
Segmentation using data diodes is an essential measure to mitigate security risks for banks