
Publications
Views about cyber security, artificial intelligence and data analytics.
Knowledge and perspectives
How is a cyber exercise built? How to apply artificial intelligence to cyber security? Explore our in-depth articles for a deep dive into our work.

New publications
We make our research findings available to everyone to foster collective expertise.

Concrete examples
We illustrate our operational achievements and present the views of our experts.

Real experiences
We share stories from our clients and partners about what it’s like to collaborate with us.
Research publications
Wide-ranging research is part of our operations. Check out our recent research publications.

Publication
16.07.2024
Quantum computing
Quantum computing trends
Machine learning applications of quantum computing: A review

Publication
16.07.2024
Post-quantum cryptography
PQC
Applications of post-quantum cryptography

Publication
16.07.2024
Cyber security
Quantum computing
Cyber protection applications of quantum computing: A review
Articles
We produce information to support your decisions. Take a look at recent insights of us.

Article
10.02.2025
Collaboration
Cyber range
2024: The Year of National Cyber Exercises

Article
23.01.2025
Cyber security
Red team
Understanding the role of red teams in cyber security exercises

Article
29.09.2023
Creating with us
Cyber range
Vote for the Most Responsible Digital Deed of the Year 2023
Customer stories
Our goal is to create real value for our partners and customers. Read more about what others have to say about us.

Customer story
05.11.2020
Cyber security
Exercising with us
Valtori develops their know-how in National Cyber Security Exercises

Customer story
14.06.2018
Cyber security
Exercising with us
Air Navigation Services Finland Oy (ANS Finland) cybersecurity exercise in 2018

Customer story
14.03.2018
Cyber security
Exercising with us
Kaisanet prepares for cyber-attacks with exercises
Jamk Arena
Our experts actively publish scientific and professional articles. More articles written by our experts can be found on the Jamk Arena.
Any questions left?

Tero Kokkonen
Director, Jamk Institute of Information Technology
+358504385317
firstname.lastname@jamk.fi