Skip to main content


In this section we have collected parts of our know-how about cybersecurity. We describe common challenges who you typically are facing when handling cybersecurity issues.

Cybersecurity - what is that?

What is cybersecurity and why is it so important? How do I start working with information security?
Reduce the risk of cyberattacks by learning how to become cybersecure!

Why is Information Security so Important?

What is information security and why does an organisation need to work with systematic information security? What can lack of information security lead to? Learn more about information security and how to start working with it.

What is network segmentation?

Supplying critical infrastructure poses many challenges, especially when integrating complex SCADA systems towards business systems that have different requirements. To succeed, network segmentation is essential.

What is a data diode?

A data diode is a cybersecurity solution that insures unidirectional information exchange.
Learn more why you need it and how it communicates with bidirectional protocols.

How do you define zones based on risk analysis according to IEC 62443?

When working with cybersecurity and segmenting your systems into security zones, it is a good idea to use risk analysis. In this text, we explain in detail what is important to keep in mind when conducting a risk analysis and risk-based zoning according to IEC 62443.

Why are products with high assurance required when security requirements are strong?

To fulfill strong security requirements, you need to focus on assurance. High assurance ensures confidence in the security features and that is why products with high assurance are required when security requirements are strong.

When is a firewall not enough?

Do you know when a firewall is not enough to keep your information secure?
And do you know what solution you should use instead?

5 things you can use a data diode for

There are more ways to use a data diode than you might think. You can use them for countless solutions, but here are five ways you may not have known about!

How to achieve SCADA security?

The basis for all work with information security, for all companies, is a continuous and systematic approach. But which measures are the most important for achieving security in SCADA systems?

Information security in a Quantum Age

To keep secret information safe from adversaries, it is absolutely essential to be forward thinking when it comes to information security. This is especially true in the Quantum age where quantum computers can break today’s most popular ciphers.

How to achieve secure outsourcing?

Outsourcing is a common way of improving the technical platform and gaining access to expertise for IT needs in all industries. It also helps cut costs. But do you know how to achieve secure outsourcing?

How to make a secure system integration?

Integration of different systems is of great value but can be associated with a security risk, so do you know how to make a secure system integration?

What is digital responsibility?

Companies must think about how they take their digital responsibilities. This responsibility means working with information management in a proactive and sustainable way.

GDPR (General Data Protection Regulation)

By legislating meaningful rights for the individual, and the corresponding obligations on the organisations who manage the information, the power of the information is transferred to the individual. Learn more about GDPR.

What is the NIS Directive?

To provide NIS appropriate security for your IT and OT you need to be in full control of your information security domains.
Learn how!

How to achieve secure digitalisation?

Digitalisation helps streamline workflows to meet expectations on availability and create new revenue opportunities. But how to achieve secure digitalisation?

What does the new security law mean?

Who is the new Swedish security protection legislation for and what does it actually say?
Learn more here.

Learn how to become an expert in cybersecurity - Cybersecurity Academy

Become an expert in cybersecurity - learn the most important steps in Advenica's Cybersecurity Academy!