How a Cyber Weapon is Made
What is the difference between an ordinary damaging code and an advance cyber weapon and exactly how is a cyber weapon deployed and...
Case FRENDS: Mission Critical Integration Platform Security Testing
HiQ Finland asked elfGROUP to test the cyber security of its FRENDS integration platform. In this way they got an outsider view of the...
Is Cybersecurity About More Than Protection?
Our Global Information Security Survey 2018-19 sees spending on cybersecurity rise, but organizations need to take even more action....
Elämää GDPR:n jälkeen – mikä on muuttunut?
Toukokuussa 2018 sovellettavaksi tullut EU:n yleinen tietosuoja-asetus (GDPR) on vaikuttanut monin tavoin suomalaistenkin yritysten...
How Embracing Cybersecurity Can Help Your Company’s Growth Strategy
A robust cybersecurity strategy is no longer a cost of doing business. It’s a determining factor of whether a company will stay in...
Cybercrime. What Does the Most Damage, Losing Data or Trust?
Trust can be destroyed by a cyberattack. To maintain or restore trust, cyber strategies must protect, optimize and enable an...
Four Cybersecurity Strategies to Score Competitive Advantages
Reading time: 3 minutes There’s a new way of thinking about cybersecurity. New security approaches are moving from thinking about...