
Capturing our Journey
Explore our thoughts over the years and learn about cybersecurity, artificial intelligence and data analytics.
Articles

Article
10.02.2025
Collaboration
Cyber range
2024: The Year of National Cyber Exercises

Article
23.01.2025
Cyber security
Red team
Understanding the role of red teams in cyber security exercises

Article
29.09.2023
Creating with us
Cyber range
Vote for the Most Responsible Digital Deed of the Year 2023

Article
17.01.2022
Cyber security
PowerShell and live response – why are they so good together?

Staff story
21.12.2021
Creating with us
Exercising with us
Upcoming event: FLAGSHIP 2, an online cybersecurity exercise

Staff story
03.09.2021
Creating with us
Food supply chain
A cyberattack targeted at food production value chain can have serious consequences

Staff story
30.04.2021
Creating with us
Healthcare
Real life medical equipment and simulated public health services in healthcare cyber security exercises

Staff story
29.01.2021
Creating with us
Healthcare
A Handbook on Cyber Security Incident Response Processes for Healthcare Actors

Article
29.01.2021
Cyber security
Healthcare
Healthcare under attack – Cyber security incident response in times of pandemic

Staff story
07.01.2021
Creating with us
Exercising with us
Coming soon – a cybersecurity exercise that emphasizes learning and cooperation

Article
29.10.2020
Cyber security
Cyber Kill Chain Based Approach for Intrusion Detection

Staff story
13.08.2020
Cyber security
Red team
CISS2020-OL: Attacking the Secure Water Treatment testbed

Staff story
11.06.2020
Cyber range
Cyber security
Adding Realism to Cyber Security Exercises – Populating RGCE environment

Staff story
05.06.2020
Creating with us
Cyber security
Continuous integration in collaborative analysis of incidents = CINCAN

Article
14.05.2020
Cyber security
Carry out investigations remotely using containerized GRR

Staff story
29.04.2020
Creating with us
Survey on Existing Cyber Ranges, their Features and Federation

Article
01.04.2020
Cyber security
Deploy the containerized GRR to unmask the intruders

Staff story
18.03.2020
Creating with us
Cyber security
Police and organisations join forces in the control of cybercrime

Staff story
21.02.2020
Cyber security
Experiences with Hardened Firefox

Staff story
28.11.2019
Cyber security
Prepare, Hunt, and Respond – conceptual model

Staff story
26.11.2019
Cyber security
Why are we sensitive to cyber attack

Staff story
25.10.2019
Creating with us
Cyber security
Tool for extracting possible IoC information from files

Staff story
24.09.2019
Creating with us
Increasing awareness of cybercrimes with #OleTietoinen campaign (Be Aware)

Staff story
23.09.2019
Cyber security
Cyber security in the healthcare sector Conference

Staff story
12.06.2019
Cyber security
Exercising with us
National Cyber Security Exercise 2019 is over or is it?

Article
26.04.2019
Cyber security
Optimising and securing Dockerfiles

Staff story
13.03.2019
Cyber security
Disobey – The Nordic Security Event

Staff story
06.03.2019
Creating with us
JAMK participates in a significant cybersecurity project gaining almost half a million EUR of 16-million-EUR budget

Article
01.02.2019
Cyber security
Analysing malicious PDF documents using Dockerized tools

Staff story
01.02.2019
Creating with us
Development of cyber security in healthcare sector improves patient security

Staff story
28.01.2019
Exercising with us
Finnish cyber security expertise in Singapore – JAMK University of Applied Sciences and Singapore Polytechnic collaborating in Centre of Excellence in Applied Cyber Security

Staff story
14.12.2018
Cyber security
From trainee to employee

Article
14.11.2018
Cyber security
User Tracking in Internet

Staff story
12.11.2018
Creating with us
We are involved in the preparatory work of the Cyber Growth Program

Staff story
31.10.2018
Cyber security
Smart Factory 2018 Exhibition 20.-22.11.2018

Staff story
16.01.2018
Cyber range
RGCE organizational environments

Staff story
07.07.2017
Cyber security
JYVSECTEC at Subcontracting fair on September

Staff story
27.04.2017
Cyber security
FINCSC incorporated as part of the Implementation Programme for Finland’s Cyber Security Strategy

Staff story
08.03.2017
Cyber security
Experiences of the ECSO WG4 (SME group) meeting

Staff story
21.02.2017
Exercising with us
Cyber exercises for operators in the industry sector was piloted

Staff story
13.02.2017
Creating with us
Exercising with us
JYVSECTEC success story

Staff story
15.12.2016
Cyber security
Cyber exercising to enhance performance

Staff story
06.07.2016
Cyber security
Institute of Information Technology and JYVSECTEC as part of it joins the founder members of ECSO

Staff story
01.07.2016
Cyber security
European Defence Agency’s training environment comes to Jyväskylä

Staff story
29.04.2016
Cyber security
JYVSECTEC participated Locked Shields 2016 exercise

Staff story
02.03.2016
Cyber security
JYVSECTEC organizes an Information Security Event for Higher Education

Staff story
15.12.2015
Cyber security
Christmas greetings

Staff story
30.11.2015
Cyber security
Cyber Challenge 2015

Staff story
29.04.2016
Cyber security
JYVSECTEC participated Locked Shields 2016 exercise

Staff story
02.03.2016
Cyber security
JYVSECTEC organizes an Information Security Event for Higher Education

Staff story
15.12.2015
Cyber security
Christmas greetings

Staff story
30.11.2015
Cyber security
Cyber Challenge 2015

Staff story
16.09.2015
Cyber security
Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

Staff story
24.08.2015
Cyber security