Skip to main content

Archive

Five steps to controlled remote access with RDP

Today, remote access is commonly used to connect with servers and networks at a distance. The functionality is there but the control is missing.

2018-12-11

Are you protecting the right things?

In today's digitalised world it is increasingly important to protect information.

2018-12-03

All clouds are not made equal – five questions to ask your cloud service provider

“Confidential information must be considered breached”.

2018-11-26

Five key facts in the Quantum Age

1. Quantum computers are becoming available to all

Quantum computers are by nature immensely faster than classical computers on making searches in data sets or factorizing large numbers.

2018-11-21

What was the target of the water station break-in?

Last week, Swedish television reported about a

2018-11-20

Can we trust what we “know” about cybersecurity?

Organisations are becoming more enlightened about the threats that cyberattacks provide.

2018-10-30

Are we taking cybersecurity seriously enough?

There are many examples of companies and organisations that have paid a high price for a lack of information security, both financially and in terms of their reputation.

2018-08-27

The story of the Trojan Horse from an IT security perspective

The legend of the Trojan War tells the story of how the Greeks tricked their opponents using a Trojan horse.

2018-06-12

Eliminate insider threats and data leakage once and for all

Three Domain Separation was originally developed by Advenica in connection to a high assurance project for the Swedish armed forces.

2018-04-09

Network segmentation – fundamental for information security

Calculating clear-cut network segmentation ROI can be tricky. It is a preventive investment, a vaccination against cyberattacks. Thinking it is unnecessary? Or waiting until it is too late?

2018-02-12

Today's security situation requires a military cyber approach

The world is changing. Established truths just a few years ago are no longer relevant.

2018-02-09

Cybersecurity challenges in 2018

Advenica’s CTO Jonas Dellenvall and CEO Einar Lindquist talk about what’s happening in cybersecurity in 2018.

2018-01-08

Critical data in motion

In today’s politically volatile and digitalised world, it’s more important than ever to protect critical information.

2017-11-27

Low maturity and readiness to cope with cyber threats

It’s scary how so many municipalities have such a low maturity and readiness to cope with cyber threats.

2017-11-23

A government proposal we welcome

The Swedish government wants to tighten protection against espionage and tampering.

2017-11-17

The perfect storm is on its way. Who cares?

What’s the forecast for critical infrastructure? The "Weather Forecast" for critical infrastructure is that the perfect storm will be triggered in May 2018. Why just then?

2017-10-27

Are fiber optics secure?

One of today’s topics at Nato´s on-going cyber symposium in Mons, Begium, was interception possibility of fiber optic networks.

2017-10-17

Advenica working with ETSI

In February this year, Advenica was given the opportunity to lead and drive two technical specifications for Middlebox Security Protocols which is two of the new work items in the Cyber Security co

2017-09-14

Advenica presents Cross Domain Solutions to the EU Council Security Committee

The policy brings forward four distinct scenarios, ranging from air gaps, through uni-directional import and export of information, to bi-directional information exchange.

2017-04-18

A Brand New Advenica

It’s all about being relevant

Let’s face it.

2017-03-23

New website focusing on National Security solutions

Advenica has its background and core business within the National Security market segment, adressing Armed Forces and Government customers.

2017-02-08

cPPP for cybersecurity

A survey, made on behalf of the European Commission, shows that the European market when it comes to cybersecurity is dominated by a small group of non-European players.

2016-03-03