Today, remote access is commonly used to connect with servers and networks at a distance. The functionality is there but the control is missing.
In today's digitalised world it is increasingly important to protect information.
“Confidential information must be considered breached”.
1. Quantum computers are becoming available to all
Quantum computers are by nature immensely faster than classical computers on making searches in data sets or factorizing large numbers.
Last week, Swedish television reported about a
Organisations are becoming more enlightened about the threats that cyberattacks provide.
There are many examples of companies and organisations that have paid a high price for a lack of information security, both financially and in terms of their reputation.
The legend of the Trojan War tells the story of how the Greeks tricked their opponents using a Trojan horse.
Three Domain Separation was originally developed by Advenica in connection to a high assurance project for the Swedish armed forces.
Calculating clear-cut network segmentation ROI can be tricky. It is a preventive investment, a vaccination against cyberattacks. Thinking it is unnecessary? Or waiting until it is too late?
The world is changing. Established truths just a few years ago are no longer relevant.
Advenica’s CTO Jonas Dellenvall and CEO Einar Lindquist talk about what’s happening in cybersecurity in 2018.
In today’s politically volatile and digitalised world, it’s more important than ever to protect critical information.
It’s scary how so many municipalities have such a low maturity and readiness to cope with cyber threats.
The Swedish government wants to tighten protection against espionage and tampering.
What’s the forecast for critical infrastructure? The "Weather Forecast" for critical infrastructure is that the perfect storm will be triggered in May 2018. Why just then?
One of today’s topics at Nato´s on-going cyber symposium in Mons, Begium, was interception possibility of fiber optic networks.
In February this year, Advenica was given the opportunity to lead and drive two technical specifications for Middlebox Security Protocols which is two of the new work items in the Cyber Security co
The policy brings forward four distinct scenarios, ranging from air gaps, through uni-directional import and export of information, to bi-directional information exchange.
It’s all about being relevant
Let’s face it.
Advenica has its background and core business within the National Security market segment, adressing Armed Forces and Government customers.
A survey, made on behalf of the European Commission, shows that the European market when it comes to cybersecurity is dominated by a small group of non-European players.