Phishingiä, smishingiä ja vishingiä
Erilaisten huijausyritysten tunnistaminen on yksilöiden käsissä, joten kalastelu ja siihen reagoiminen on yksi kriittisimmistä yritysten...
Verkkoon kytketty IoT-laite voi olla vakava tietoturvaongelma
Kyberturvallisuus varmistaa yritysten selviytymiskyvyn sähköisissä toimintaympäristöissä. Viime vuosina laajaa kiinnostusta herättäneen...
Howden Cyber Capabilities
Howden insurance broker Cyber capabilities #Howden #Cybercapabilities
VTT Cyber Security Services presents: A short movie about the good guys
Building a safer and more stable future. VTT cyber security experts are here to help! #VTT #Video
Using blockchains to increase trust in AI
Wouldn’t it be great if AI applications could trust each other in the same way humans do? I trust my local bank to handle my account...
Fraud and deceit – deception techniques used in nature are copied in cyberspace
Entrapment, fraud and deceit happen everywhere – plants and animals have the required abilities. Lying and deceit are everyday events and...
Remote attestation adds trust to critical infrastructures
When collecting measurements (e.g. temperature) from the Internet of Things (IoT), you want to make sure that those measurements are...
Learning about information security – the hard way or through anticipation and practice?
Information security is an increasingly important part of the lives of both private individuals and companies and organisations. You can...
When the cyber weather forecast gets gloomy, everyone should get prepared
In the modern society computers are embedded everywhere and automation affects our daily lives in several ways. Networked computers...