A stricter Protective Security Act: 3 things the CISO needs to consider
The new, stricter Protective Security Act will enter into force on December 1st 2021, if the proposal passes. The CISO needs to be prepared!
CISO – How you make sure that the management team prioritises cybersecurity
It is not always easy for the CISO to explain to the management team why working with cybersecurity is so important. Here are some things to keep in mind!
IEC 62443 – a standard you should know if you work with security in ICS systems
We explain what the standard IEC 62443 covers and what you need to think about if you want to follow it!
Securely integrate IT/OT – learn how to do it step by step!
We have listed 5 steps for how to securely integrate IT/OT. The method is based on the standard IEC 62443 – a must for those who work with security within OT.
How insurance companies protect critical and personal information
It is highly necessary that insurance companies protect critical and personal information with appropriate cybersecurity solutions.
Security expert: How to handle the old and new threat of a software attack
Sami Hyytiäinen, technical expert, explains how to handle a software attack and how secure updates can be managed with the right solutions.
2 important pieces of advice on how society can become less vulnerable to IT attacks
Media has been flooded with news of IT attacks affecting large sections of society - we give some piece of advice on how the attack could have been limited.
How the process industry can handle today’s security threats
The process industry is regularly subjected to attacks – therefore, we have gathered some advice on how the process industry can protect their control systems.
5 things about cybersecurity you have not thought about
We present 5 things about cybersecurity that you might not have thought about, that will give you an advantage when working with cybersecurity!
Why invest in cybersecurity?
The reasons to invest in cybersecurity vary from organisation to organisation. What matters is that you know the level of protection your organisation needs!
Why you should secure your network with more than a firewall
In order to protect what is most sensitive and critical to operations, you should secure your network with more than a firewall!
Increase security for your OT systems
Since the information in OT systems is very important for the company that uses the system, and sometimes important for the whole society, it must be protected.
How to work with network segmentation using zoning
We have defined 5 steps for network segmentation using zoning, and hope that these can guide you and help create a successful project!
How to make your data center secure with cybersecurity solutions
It can be a challenge to run and operate data centers. There are a number of threats that need to be mitigated with the right security solutions.
New proposed directive - NIS 2
There is a proposal for a new directive which originates from the NIS directive – this new proposed directive is called NIS 2.
How do we acquire high assurance?
It is difficult to measure security - this is the reason why we prefer to talk about assurance, rather than security.
Protecting Banks’ Sensitive Information
Cyberattacks are a constant threat to organisations - for banks, it is important to have in mind as they handle sensitive information.
The 5 Most Increasing Types of Cyber Threats
A report by the European Union Agency for Cybersecurity (ENISA) shows that five different cyber threats in particular are increasing in Europe.
How you can easily ensure one-way communication between two networks
Many networks require extra protection against tampering and data leakage. In these cases, a data diode can be very useful!
How to Use Network Segmentation to Follow Proposed Regulations Concerning Information Security for Water Suppliers
There is now a proposal for mandatory adjustments in Livsmedelsverket’s regulations on information security for socially important services.
Use data diodes to protect information in critical infrastructure
Data Diodes are the failsafe way to protect your sensitive systems and confidential data.
How to Conduct Secure Updates
Conducting updates is something that can be a security risk if not done properly. Learn how to conduct secure updates in this blog post!
Protect your SCADA Environment from Weaknesses
Vulnerabilities in protocol gateways can result in serious cybersecurity attacks. The right solutions are needed to secure your SCADA environment.
Data diodes raise cybersecurity for banks
Segmentation using data diodes is an essential measure to mitigate security risks for banks
Why Vienna chose Advenica’s Data Diodes to protect its energy infrastructure
Read our customer case and learn how Wiener Netze in Vienna uses Advenica’s Data Diodes for protection
Secure information management for ICS systems
Secure information management for ICS systems is one of the most challenging areas for companies using them.
How to do a secure transfer of SCADA information
The processes that SCADA systems control, and monitor are often of very sensitive nature - and special solutions are needed to get a secure transfer.
Security in a future of IoT based on 5G
How does security work In a future of IoT in a 5G world? Here are some important things to consider.
Cybersecurity trends for 2020
We have noted a few trends within cybersecurity for 2020 that we want to share.
How to get started with information security work?
The digital world places new, higher demands on information security. Do you know how to start working with information security?
How the energy sector can secure power and a functioning society
With more frequent and increasingly vicious cyberattacks, vulnerabilities in IT architecture pose a severe threat.
Security culture - an important part of cybersecurity
Cybersecurity today is not only a technical challenge but also a human challenge - a matter of security culture.
Lack of cybersecurity awareness in the oil & gas industry – a major risk for the environment
A cyberattack on oil and gas control systems can result in severe consequences to human safety and the environment.
How municipalities keep citizens’ integrity and privacy safe
The only way to protect digital communication and not fall victim to these attacks is to work with cybersecurity in a consistent and structured way.
Information security compliance – five business benefits
Information security compliance brings significant benefits to you and your business!
How you secure the management's commitment to information security
Here are a few things you should bring to a presentation for the management regarding information security.
Is your security solution future-proof?
Do you know how future-proof the solution you choose to invest in actually is? Who is responsible if your solution is hacked in a few years?
The NIS directive - we can help you comply
How is the NIS work progressing in your organisation? Have you started to work for compliance with all the requirements?
How does your organisation secure information security in ICS and SCADA systems?
How to ensure information security while maintaining the accessibility and integrity of the systems?
Know how to do secure file transfer to classified networks?
We have a solution that provides strong protection for file transfers.
Feel in control regarding the NIS directive?
Do you know how to work systematically with information security?
Is your organisation protected from being hacked?
The data intrusions are constantly increasing. Does your organisation have the right protection?
Cyber-attacks – part of our everyday lives
Advanced cyber-attacks from various directions, even from state attackers in other countries, are today unfortunately part of our everyday life.
When a firewall is not enough
What do you do to protect your organisation’s network and information flow? What solution do you use and depend on?
What is a data diode and how does it work?
A data diode is a cybersecurity solution that makes sure that information can only travel in one direction.
The defence needs trusted cybersecurity solutions – do you?
The defence industry requires high assurance solutions - Every step in the development, from design to the aftermarket, must be controlled to ensure this
Maintain security, even when working remotely!
How do you ensure that remote access does not open more possible attack vectors for a potential attacker?
Four reasons to invest in future-proof solutions today
For those of you responsible for critical infrastructure, we have compiled some talking points so you can make responsible and sustainable decisions.
The cyber year of 2019 and what’s to come
Jonas Dellenvall, CTO at Advenica, shares his view on the security year ahead of us.
Five steps to controlled remote access with RDP
We give you 5 steps to take control over remote access
Are you protecting the right things?
Protecting all the information flow in a company today at the same level is not possible - so how to do it right?
All clouds are not made equal – five questions to ask your cloud service provider
Are cloud services secure? Here are five questions to ask your cloud service provider.
Five key facts in the Quantum Age
Quantum computers and quantum technology is coming - here five key facts in the quantum age.
Can we trust what we “know” about cybersecurity?
When misconceptions (or rather myths) about cybersecurity are circulating freely, how do we know what to trust?
Are we taking cybersecurity seriously enough?
So how is it that we believe we know all about cybersecurity? Are we just being naïve?
The story of the Trojan Horse from an IT security perspective
The legend of the Trojan horse - and a parallel to existing problems with modern technology for IT security.
Eliminate insider threats and data leakage once and for all
Three Domain Separation is a unique technique enabling centralised control with no risk of administrators gaining access to business critical information.
Network segmentation – fundamental for information security
Why is network segmentation required?
Today's security situation requires a military cyber approach
An increasing number of businesses need the kind of effective protection previously only used by defense forces and intelligence agencies
Cybersecurity challenges in 2018
Advenica’s CTO Jonas Dellenvall and CEO Einar Lindquist talk about what’s happening in cybersecurity in 2018.
Low maturity and readiness to cope with cyber threats
A summary of Swedish IT Security Index 2.0 shows some scary insights that can have importance for the security of society and our ability to resist cyberthreats
The perfect storm is on its way. Who cares?
The "Weather Forecast" for critical infrastructure is that the perfect storm will be triggered in May 2018.
Are fiber optics secure?
Optical fibers are used in fiber-optic communications over long distances and at high bandwidth. But, are they secure?