The only constant is that things change - the way cyber threats have evolved
Håkan Ahrefors, IT manager and security specialist at Advenica, reflects about the development of cyberattacks.
Digitalisation vs. security
Digitalisation has made our everyday life easier. But is security keeping up at the same pace so that we can trust that our digital services are safe?
The history of malware
The history of malware goes back further than most might think. We have listed some of the most significant ones in history so far!
Trend scouting in cybersecurity
We have asked three of our cybersecurity experts to comment on trends for the new year. What do they think will happen in cybersecurity in 2023?
What can a lack of information security lead to?
In this blog post, we will explain the consequences of inadequate information security.
How management can organise their business to avoid cyberattacks
In this blog post, we have listed a few things to consider to be able to avoid being affected by cyberattacks!
Is your network isolation leaking?
What if there was a leak in the network that you thought was isolated? Information security is more important than ever and requires structured work.
5 tips for how you better can protect yourself against cyberattacks
In this blog post, we describe 5 important tips you should be aware of to better protect yourself against cyberattacks!
IIoT and Industry 4.0 security challenges
To avoid the risk of opening up for cyberattacks, industries and enterprises adopting IIoT have to increase the level of protection.
The security risks the CISO needs to be aware of
A CISO needs to be aware of a lot to avoid that the vulnerabilities are exploited for a cyberattack. We describe six security risks that you should be aware of!
5 things about cybersecurity you have not thought about
We present 5 things about cybersecurity that you might not have thought about, that will give you an advantage when working with cybersecurity!
Why invest in cybersecurity?
The reasons to invest in cybersecurity vary from organisation to organisation. What matters is that you know the level of protection your organisation needs!
How to make your data center secure with cybersecurity solutions
It can be a challenge to run and operate data centers. There are a number of threats that need to be mitigated with the right security solutions.
How do we acquire high assurance?
It is difficult to measure security - this is the reason why we prefer to talk about assurance, rather than security.
How to Conduct Secure Updates
Conducting updates is something that can be a security risk if not done properly. Learn how to conduct secure updates in this blog post!
Security in a future of IoT based on 5G
How does security work In a future of IoT in a 5G world? Here are some important things to consider.
How municipalities keep citizens’ integrity and privacy safe
The only way to protect digital communication and not fall victim to these attacks is to work with cybersecurity in a consistent and structured way.
Is your organisation protected from being hacked?
The data intrusions are constantly increasing. Does your organisation have the right protection?
Cyber-attacks – part of our everyday lives
Advanced cyber-attacks from various directions, even from state attackers in other countries, are today unfortunately part of our everyday life.
Maintain security, even when working remotely!
How do you ensure that remote access does not open more possible attack vectors for a potential attacker?
The cyber year of 2019 and what’s to come
Jonas Dellenvall, CTO at Advenica, shares his view on the security year ahead of us.
Are you protecting the right things?
Protecting all the information flow in a company today at the same level is not possible - so how to do it right?
Can we trust what we “know” about cybersecurity?
When misconceptions (or rather myths) about cybersecurity are circulating freely, how do we know what to trust?
Are we taking cybersecurity seriously enough?
So how is it that we believe we know all about cybersecurity? Are we just being naïve?
The story of the Trojan Horse from an IT security perspective
The legend of the Trojan horse - and a parallel to existing problems with modern technology for IT security.