Skip to main content


In this section we have collected parts of our know-how about cybersecurity. We describe common challenges who you typically are facing when handling cybersecurity issues.

Cybersecurity - what is that?

What is cybersecurity and why is it so important? How do I start working with information security?
Reduce the risk of cyberattacks by learning how to become cybersecure!

When is a firewall not enough?

Do you know when a firewall is not enough to keep your information secure?
And do you know what solution you should use instead?

What is a data diode?

A data diode is a cybersecurity solution that insures unidirectional information exchange.
Learn more why you need it and how it communicates with bidirectional protocols.

What is network segmentation?

Supplying critical infrastructure poses many challenges, especially when integrating complex SCADA systems towards business systems that have different requirements. To succeed, network segmentation is essential.

Information security in a Quantum Age

To keep secret information safe from adversaries, it is absolutely essential to be forward thinking when it comes to information security. This is especially true in the Quantum age where quantum computers can break today’s most popular ciphers.

How to achieve secure outsourcing?

Outsourcing is a common way of improving the technical platform and gaining access to expertise for IT needs in all industries. It also helps cut costs. But do you know how to achieve secure outsourcing?

How to make a secure system integration?

Integration of different systems is of great value but can be associated with a security risk, so do you know how to make a secure system integration?

What is digital responsibility?

Companies must think about how they take their digital responsibilities. This responsibility means working with information management in a proactive and sustainable way.

GDPR (General Data Protection Regulation)

By legislating meaningful rights for the individual, and the corresponding obligations on the organisations who manage the information, the power of the information is transferred to the individual. Learn more about GDPR.

What is the NIS Directive?

To provide NIS appropriate security for your IT and OT you need to be in full control of your information security domains.
Learn how!

How to achieve secure digitalisation?

Digitalisation helps streamline workflows to meet expectations on availability and create new revenue opportunities.
But how to achieve secure digitalisation?

What does the new security law mean?

Who is the new Swedish security protection legislation for and what does it actually say?
Learn more here.