

Howden Cyber Capabilities
Howden insurance broker Cyber capabilities #Howden #Cybercapabilities


VTT Cyber Security Services presents: A short movie about the good guys
Building a safer and more stable future. VTT cyber security experts are here to help! #VTT #Video
Using blockchains to increase trust in AI
Wouldn’t it be great if AI applications could trust each other in the same way humans do? I trust my local bank to handle my account since I know its history and it has been doing business honestly since my grandparents were alive. I trust my friends even more, because I know more about their history. Trust is often based on a common history, and we now have a technology for recording and sharing history. What if every instance of AI had access to a public ledger, which conta


Fraud and deceit – deception techniques used in nature are copied in cyberspace
Entrapment, fraud and deceit happen everywhere – plants and animals have the required abilities. Lying and deceit are everyday events and occur in an infinite number of forms. The techniques used by various species can be used to deceive attackers in cyberspace. Defensive mimicry [Huheey] occurs among plants and insects in particular. A familiar example from the natural world would be hoverflies, whose colouring mimics bees, wasps or hornets. In the natural sciences, this is


Remote attestation adds trust to critical infrastructures
When collecting measurements (e.g. temperature) from the Internet of Things (IoT), you want to make sure that those measurements are fresh and originate from calibrated and untampered sensor nodes. Integrity verification of sensor nodes is becoming more critical as attacks against IoT devices have become more common and also utilized in large botnets (e.g. the Mirai case). Remote attestation is a mechanism of measuring internal state of the system. It reports fresh state info


Learning about information security – the hard way or through anticipation and practice?
Information security is an increasingly important part of the lives of both private individuals and companies and organisations. You can learn secure practices and ways to minimise threats in many ways. However, it is important to consider what you would need to learn and how you can best learn those particular matters. The least you can do is learn from your own mistakes. When an information security threat is realised, it is important that, once the dust has settled, you an


When the cyber weather forecast gets gloomy, everyone should get prepared
In the modern society computers are embedded everywhere and automation affects our daily lives in several ways. Networked computers control even the most critical infrastructures such as electricity, water distribution, and traffic. Our dependency on these networks also bring risks: we are more vulnerable than ever to cyber attacks. At worst cyber threats spreading via computer networks could weaken or even cripple our society. In order to maintain cyber safety, professionals