Category Archives: News and insights

Modelling Medical Devices with Honeypots

Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. In the healthcare domain there are abundant networked systems, software and hardware, which may be vulnerable for a cyber intrusion […]

Coming soon – a cybersecurity exercise that emphasizes learning and cooperation

CyberSec4Europe project is organizing a two-day cybersecurity exercise, called by Flagship 1. The event is held on 12-13 January 2021 and it is only accessible online to CyberSec4Europe project partners. The goal of Flaship1 is to provide a positive learning opportunity for participants. Exercise’s participants will be assigned a work role in a fictional organization. […]

Kyberhäiriöiden hallinta – Käsikirja terveydenhuollon toimijoille

Käsikirjan tarkoitus on auttaa suomalaisia terveydenhuollon organisaatioita kehittämään kyberhäiriöiden hallinnan prosessejaan ja toimintaohjeitaan, jotta voidaan varmistaa yhteiskunnan kannalta kriittisen terveydenhuollon toiminnan jatkuvuus myös kyberhyökkäysten tapahtuessa. Käsikirja liittyy kiinteästi koronakriisin aiheuttamien haasteiden ratkaisemiseen kyberhäiriöiden hallinnassa. Käsikirjan sisältämät prosessit, ohjeet ja tarkistuslistat on esitetty helposti käytäntöön vietävässä muodossa. Tekniset asiasisällöt ja termit on selitetty lukijalle. Käsikirjan kohderyhmänä […]

HPC-Performance tests

High-performance computing (HPC) is defined as the ability to process a massive amount of data and perform complex calculations at high speeds. Technologies such as DA and AI need the big amount of data and computing resources. Especially the deep learning (DL) and neural network development need lots of computational power which cannot be achieved […]

Dr. Kokkonen’s New Adjunct Professorship at JYU

Our R&D Manager Tero Kokkonen has been Promoted to Adjunct Professor in Cyber Security at the University of Jyväskylä. Kokkonen is a graduate of University of Jyväskylä (Ph.D. Mathematical Information Technology) from 2016. The topic of his doctoral thesis was ”Anomaly-Based Online Intrusion Detection System as a Sensor for Cyber Security Situational Awareness System”. He […]

Quality Criteria for Cyber Security MOOCs

Cyber security MOOCs (Massive Open Online Courses) can enable lifelong learning and increase the cyber security competence of experts and citizens. This paper contributes with a review of existing cyber security MOOCs and MOOC quality assurance frameworks. It then presents quality criteria, which we elicited for evaluating whether cyber security MOOCs are worthy to be […]

Valtori develops their know-how in National Cyber Security Exercises

Government ICT Centre Valtori, the provider of ICT services for customers in the central government, develops and maintains the widest ICT environment in Finland.  Valtori’s key task is to ensure the functionality of services in all circumstances. With the increase in the number of cyber threats, the preparedness to meet these threats is very vital […]

Cyber Kill Chain Based Approach for Intrusion Detection

The number of intrusions into organization IT environments has been increasing over the years. Detecting intrusions remains a difficult task as the long average adversary dwell times indicate (56 days in 2019, according to the FireEye M-Trends 2020 report). A new approach for intrusion detection is to use a cyber kill chain-based model, where system […]

Comprehensive Cyber Arena; The Next Generation Cyber Range

The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack or an intrusion against an electricity system may affect the performance of healthcare system as well. For organisation’s cyber resilience, know-how […]

Review of Pedagogical Principles of Cyber Security Exercises

Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations […]