How a Cyber Weapon is Made
What is the difference between an ordinary damaging code and an advance cyber weapon and exactly how is a cyber weapon deployed and executed? Stuxnet was, according to many Security researchers, one of the first and most recognizable cyber weapons. The resources needed to develop Stuxnet and its different parts are most likely something only one nation had: Several programming languages, large amounts of modules, several zero-days, knowledge of the centrifuges in the Uranium
Case FRENDS: Mission Critical Integration Platform Security Testing
HiQ Finland asked elfGROUP to test the cyber security of its FRENDS integration platform. In this way they got an outsider view of the security level of FRENDS, and a CyberSafe certificate that they plan to use in their customer and product communication to testify to FRENDS suitability for the automation of mission critical business processes and integration of confidential information between IT systems. This blog describes how security testing was conducted, and what resul
Is Cybersecurity About More Than Protection?
Our Global Information Security Survey 2018-19 sees spending on cybersecurity rise, but organizations need to take even more action. After a year in which organizations have been rocked by a series of large-scale cybersecurity breaches and ongoing recriminations over state-sponsored interventions, this year’s EY Global Information Security Survey (GISS) shows cybersecurity continuing to rise up the board agenda. Organizations are spending more on cybersecurity, devoting incre
Elämää GDPR:n jälkeen – mikä on muuttunut?
Toukokuussa 2018 sovellettavaksi tullut EU:n yleinen tietosuoja-asetus (GDPR) on vaikuttanut monin tavoin suomalaistenkin yritysten toimintaan. Harmailta hiuksilta ei ole täysin vältytty, mutta ainakin yksi selvä muutos parempaan on uudistuksen myötä saatu: yrityksissä ymmärretään paremmin, miten tärkeää henkilötietojen oikeaoppinen käsittely on. Moni yritys on alkanut ymmärtää, että tietosuoja-asetuksen vaatimukset eivät ole pelkkä välttämätön paha, vaan niistä saa myös konk
How Embracing Cybersecurity Can Help Your Company’s Growth Strategy
A robust cybersecurity strategy is no longer a cost of doing business. It’s a determining factor of whether a company will stay in business. When organizations think about cybersecurity they tend to think of two things: cyber hackers and data breaches. And it’s true, cyber attackers are becoming more sophisticated, using more advanced phishing and malware techniques to find weak points in organizations large and small, and in public and private sectors alike. The true cost of
Cybercrime. What Does the Most Damage, Losing Data or Trust?
Trust can be destroyed by a cyberattack. To maintain or restore trust, cyber strategies must protect, optimize and enable an organization. New technologies are exposing financial services firms to greater vulnerabilities. While cybersecurity is enabling innovation and change, the ongoing impact of cyberattacks threatens to erode trust in many institutions. And many organizations have yet to provide the levels of cyber resilience and protection needed to maintain or restore th
Four Cybersecurity Strategies to Score Competitive Advantages
Reading time: 3 minutes There’s a new way of thinking about cybersecurity. New security approaches are moving from thinking about cybersecurity as a defensive approach, to thinking about it as a source of competitive advantage. With Boards looking at how to protect, optimise and grow their businesses by sustaining IP, assets and brand, here are four ways to position your cybersecurity strategies for a distinct advantage. Have a quantifiable risk Just thinking about cybersecur