Header

Capturing our Journey

Explore our thoughts over the years and learn about cybersecurity, artificial intelligence and data analytics.

Slide

Articles

Publications and perspectives

Article

10.02.2025

Collaboration

Cyber range

2024: The Year of National Cyber Exercises

Article

23.01.2025

Cyber security

Red team

Understanding the role of red teams in cyber security exercises  

Article

29.09.2023

Creating with us

Cyber range

Vote for the Most Responsible Digital Deed of the Year 2023

Article

17.01.2022

Cyber security

PowerShell and live response – why are they so good together?

Staff story

21.12.2021

Creating with us

Exercising with us

Upcoming event: FLAGSHIP 2, an online cybersecurity exercise

Staff story

03.09.2021

Creating with us

Food supply chain

A cyberattack targeted at food production value chain can have serious consequences

Publications and perspectives

Staff story

30.04.2021

Creating with us

Healthcare

Real life medical equipment and simulated public health services in healthcare cyber security exercises

Staff story

29.01.2021

Creating with us

Healthcare

A Handbook on Cyber Security Incident Response Processes for Healthcare Actors 

Article

29.01.2021

Cyber security

Healthcare

Healthcare under attack – Cyber security incident response in times of pandemic

Staff story

07.01.2021

Creating with us

Exercising with us

Coming soon – a cybersecurity exercise that emphasizes learning and cooperation

Article

29.10.2020

Cyber security

Cyber Kill Chain Based Approach for Intrusion Detection

Staff story

13.08.2020

Cyber security

Red team

CISS2020-OL: Attacking the Secure Water Treatment testbed

Publications and perspectives

Staff story

11.06.2020

Cyber range

Cyber security

Adding Realism to Cyber Security Exercises – Populating RGCE environment

Staff story

05.06.2020

Creating with us

Cyber security

Continuous integration in collaborative analysis of incidents = CINCAN

Article

14.05.2020

Cyber security

Carry out investigations remotely using containerized GRR

Staff story

29.04.2020

Creating with us

Survey on Existing Cyber Ranges, their Features and Federation

Article

01.04.2020

Cyber security

Deploy the containerized GRR to unmask the intruders

Staff story

18.03.2020

Creating with us

Cyber security

Police and organisations join forces in the control of cybercrime

Publications and perspectives

Staff story

21.02.2020

Cyber security

Experiences with Hardened Firefox

Staff story

28.11.2019

Cyber security

Prepare, Hunt, and Respond – conceptual model

Staff story

26.11.2019

Cyber security

Why are we sensitive to cyber attack

Staff story

25.10.2019

Creating with us

Cyber security

Tool for extracting possible IoC information from files

Staff story

24.09.2019

Creating with us

Increasing awareness of cybercrimes with #OleTietoinen campaign (Be Aware)

Staff story

23.09.2019

Cyber security

Cyber security in the healthcare sector Conference

Publications and perspectives

Staff story

12.06.2019

Cyber security

Exercising with us

National Cyber Security Exercise 2019 is over or is it?

Article

26.04.2019

Cyber security

Optimising and securing Dockerfiles

Staff story

13.03.2019

Cyber security

Disobey – The Nordic Security Event

Staff story

06.03.2019

Creating with us

JAMK participates in a significant cybersecurity project gaining almost half a million EUR of 16-million-EUR budget

Article

01.02.2019

Cyber security

Analysing malicious PDF documents using Dockerized tools

Staff story

01.02.2019

Creating with us

Development of cyber security in healthcare sector improves patient security

Publications and perspectives

Staff story

28.01.2019

Exercising with us

Finnish cyber security expertise in Singapore – JAMK University of Applied Sciences and Singapore Polytechnic collaborating in Centre of Excellence in Applied Cyber Security

Staff story

14.12.2018

Cyber security

From trainee to employee

Article

14.11.2018

Cyber security

User Tracking in Internet

Staff story

12.11.2018

Creating with us

We are involved in the preparatory work of the Cyber Growth Program

Staff story

31.10.2018

Cyber security

Smart Factory 2018 Exhibition 20.-22.11.2018

Staff story

16.01.2018

Cyber range

RGCE organizational environments

Publications and perspectives

Staff story

07.07.2017

Cyber security

JYVSECTEC at Subcontracting fair on September

Staff story

27.04.2017

Cyber security

FINCSC incorporated as part of the Implementation Programme for Finland’s Cyber Security Strategy

Staff story

08.03.2017

Cyber security

Experiences of the ECSO WG4 (SME group) meeting

Staff story

21.02.2017

Exercising with us

Cyber exercises for operators in the industry sector was piloted

Staff story

13.02.2017

Creating with us

Exercising with us

JYVSECTEC success story

Staff story

15.12.2016

Cyber security

Cyber exercising to enhance performance

Publications and perspectives

Staff story

06.07.2016

Cyber security

Institute of Information Technology and JYVSECTEC as part of it joins the founder members of ECSO

Staff story

01.07.2016

Cyber security

European Defence Agency’s training environment comes to Jyväskylä

Staff story

29.04.2016

Cyber security

JYVSECTEC participated Locked Shields 2016 exercise

Staff story

02.03.2016

Cyber security

JYVSECTEC organizes an Information Security Event for Higher Education

Staff story

15.12.2015

Cyber security

Christmas greetings

Staff story

30.11.2015

Cyber security

Cyber Challenge 2015

Publications and perspectives

Staff story

29.04.2016

Cyber security

JYVSECTEC participated Locked Shields 2016 exercise

Staff story

02.03.2016

Cyber security

JYVSECTEC organizes an Information Security Event for Higher Education

Staff story

15.12.2015

Cyber security

Christmas greetings

Staff story

30.11.2015

Cyber security

Cyber Challenge 2015

Staff story

16.09.2015

Cyber security

Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

Staff story

24.08.2015

Cyber security

Upcomming events for autumn 2015

Slide