Skip to main content

Know-how

In this section we have collected parts of our know-how about cybersecurity. We describe common challenges who you typically are facing when handling cybersecurity issues.

what is a data diode

What is a data diode?

A data diode is a cybersecurity solution that insures unidirectional information exchange. This high assurance hardware device maintains both network integrity by preventing intrusion, as well as network confidentiality by protecting the most security sensitive information.

Read more

 
what is the nis directive

What is the NIS Directive?

To provide NIS appropriate security for your IT and OT you need to be in full control of your information security domains. Today in the ever interconnected and digitalisation driven reality, fully air-gaped solutions is no longer a viable alternative. You need to allow information to travel between domains an you need to stay in control.

Read more

SSL

What does the new Swedish security protection legislation mean?

The new Swedish security protection legislation clarifies the obligations for companies with security-sensitive activities and the importance of the operators performing security protection analyses for their operations.

Read more

 
secure digitalisation

Secure digitalisation

Digitalisation is revolutionising every industry. It helps streamline workflows to meet expectations on availability and create new revenue opportunities. New challenges also arise when different systems communicate with each other.

Read more

 
gdpr

GDPR (General Data Protection Regulation)

By legislating meaningful rights for the individual, and the corresponding obligations on the organisations who manage the information, the power of the information is transferred to the individual. To ensure compliance imposed severe penalty payment.

Read more

 
quantum

What does quantum-safe mean?

For organisations and institutions with interest in keeping secret information safe from adversaries, it is absolutely essential to be forward thinking when it comes to information security.

Read more

 
secured integration

Secured integration

Many businesses are trying to become more competitive and create added value for customers and other stakeholders by attempting to integrate old and new systems. Regardless of which technology you use or what mix of infrastructure you require, you need to assess the impact of information security in these systems.

Read more

 
network segmentation

Network segmentation

Supplying critical infrastructure poses many challenges, especially when integrating complex SCADA systems towards business systems that have different requirements. There are many challenges in connecting safe and secure IT networks.

Read more

 

outsourcing

Secure outsourcing

Outsourcing is a common way of improving the technical platform and gaining access to expertise for IT needs in all industries. It also helps cut costs. One aspect often overlooked in outsourcing is the risk of letting a supplier manage personal information or other sensitive information.

Read more

what is digital responsibility

What is digital responsibility?

There’s a growing concern about how to establish secure information exchanges. Companies must think about how they take their digital responsibilities. Responsibility means working with information management in a proactive and sustainable way.

Read more