Author Archives: Kaisa Sulasalmi

Coming soon – a cybersecurity exercise that emphasizes learning and cooperation

CyberSec4Europe project is organizing a two-day cybersecurity exercise, called by Flagship 1. The event is held on 12-13 January 2021 and it is only accessible online to CyberSec4Europe project partners. The goal of Flaship1 is to provide a positive learning opportunity for participants. Exercise’s participants will be assigned a work role in a fictional organization. […]

Kyberhäiriöiden hallinta – Käsikirja terveydenhuollon toimijoille

Käsikirjan tarkoitus on auttaa suomalaisia terveydenhuollon organisaatioita kehittämään kyberhäiriöiden hallinnan prosessejaan ja toimintaohjeitaan, jotta voidaan varmistaa yhteiskunnan kannalta kriittisen terveydenhuollon toiminnan jatkuvuus myös kyberhyökkäysten tapahtuessa. Käsikirja liittyy kiinteästi koronakriisin aiheuttamien haasteiden ratkaisemiseen kyberhäiriöiden hallinnassa. Käsikirjan sisältämät prosessit, ohjeet ja tarkistuslistat on esitetty helposti käytäntöön vietävässä muodossa. Tekniset asiasisällöt ja termit on selitetty lukijalle. Käsikirjan kohderyhmänä […]

HPC-Performance tests

High-performance computing (HPC) is defined as the ability to process a massive amount of data and perform complex calculations at high speeds. Technologies such as DA and AI need the big amount of data and computing resources. Especially the deep learning (DL) and neural network development need lots of computational power which cannot be achieved […]

Dr. Kokkonen’s New Adjunct Professorship at JYU

Our R&D Manager Tero Kokkonen has been Promoted to Adjunct Professor in Cyber Security at the University of Jyväskylä. Kokkonen is a graduate of University of Jyväskylä (Ph.D. Mathematical Information Technology) from 2016. The topic of his doctoral thesis was ”Anomaly-Based Online Intrusion Detection System as a Sensor for Cyber Security Situational Awareness System”. He […]

Quality Criteria for Cyber Security MOOCs

Cyber security MOOCs (Massive Open Online Courses) can enable lifelong learning and increase the cyber security competence of experts and citizens. This paper contributes with a review of existing cyber security MOOCs and MOOC quality assurance frameworks. It then presents quality criteria, which we elicited for evaluating whether cyber security MOOCs are worthy to be […]

Valtori develops their know-how in National Cyber Security Exercises

Government ICT Centre Valtori, the provider of ICT services for customers in the central government, develops and maintains the widest ICT environment in Finland.  Valtori’s key task is to ensure the functionality of services in all circumstances. With the increase in the number of cyber threats, the preparedness to meet these threats is very vital […]

Cyber Kill Chain Based Approach for Intrusion Detection

The number of intrusions into organization IT environments has been increasing over the years. Detecting intrusions remains a difficult task as the long average adversary dwell times indicate (56 days in 2019, according to the FireEye M-Trends 2020 report). A new approach for intrusion detection is to use a cyber kill chain-based model, where system […]

Comprehensive Cyber Arena; The Next Generation Cyber Range

The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack or an intrusion against an electricity system may affect the performance of healthcare system as well. For organisation’s cyber resilience, know-how […]

Survey on Existing Cyber Ranges, their Features and Federation

Cyber range technologies, products and national and international initiatives have developed greatly within the last few years. There are several reasons why cyber ranges have suddenly become increasingly popular; one reason being that more organizations, both private and public, are beginning to invest in them. Cyber Security for Europe research project is working to boost […]

Deploy the containerized GRR to unmask the intruders

Containerized GRR is a forked implementation of the GRR Rapid Response, a tool for incident response designed and developed by Google engineers. Containerized GRR differs from the original GRR by utilizing the Docker containers on its working. In my experience, Docker containers are a more approachable way to take the tool into use since containers […]