How to Conduct Secure Updates
Conducting updates is something that can be a security risk if not done properly. Learn how to conduct secure updates in this blog post!
Security in a future of IoT based on 5G
How does security work In a future of IoT in a 5G world? Here are some important things to consider.
How municipalities keep citizens’ integrity and privacy safe
The only way to protect digital communication and not fall victim to these attacks is to work with cybersecurity in a consistent and structured way.
Is your organisation protected from being hacked?
The data intrusions are constantly increasing. Does your organisation have the right protection?
Cyber-attacks – part of our everyday lives
Advanced cyber-attacks from various directions, even from state attackers in other countries, are today unfortunately part of our everyday life.
Maintain security, even when working remotely!
How do you ensure that remote access does not open more possible attack vectors for a potential attacker?
The cyber year of 2019 and what’s to come
Jonas Dellenvall, CTO at Advenica, shares his view on the security year ahead of us.
Are you protecting the right things?
Protecting all the information flow in a company today at the same level is not possible - so how to do it right?
Can we trust what we “know” about cybersecurity?
When misconceptions (or rather myths) about cybersecurity are circulating freely, how do we know what to trust?
Are we taking cybersecurity seriously enough?
So how is it that we believe we know all about cybersecurity? Are we just being naïve?
The story of the Trojan Horse from an IT security perspective
The legend of the Trojan horse - and a parallel to existing problems with modern technology for IT security.