Category Archives: Blog

Analysing malicious PDF documents using Dockerized tools

One of the goals of the CinCan project is to provide tools that automate the repetitive tasks of malware analysis using practices familiar from continuous integration to enable rapid creation, augmentation, correlation and sharing of analysis and threat intelligence. Using Docker containers, we have portable tools, which can be conveniently configured for use in designated […]

From trainee to employee

Practical training is an important part of studies and has a special part in education. Training period gives an excellent opportunity to get familiar with working life during the studies.  It also gives you a better chance to find employment opportunities that match your field of studies after graduation. In this blog post I will […]

User Tracking in Internet

User tracking has gained interest after it has become a major source of revenue for advertisers. Tracking methods have evolved , however the users have also become more aware of how they are being tracked and what to do to evade tracking. More tools are available for personal tracking protection and they are becoming increasingly […]

RGCE organizational environments

JYVSECTEC’s cyber range RGCE has been in development since 2011 aiming to provide a realistic exercise environment for organizations of different sizes and industry sectors. In recent years, the development has focused on building multiple business sector specific organization environments, which mimic technical and business functions of real organizations. These environments also have realistic dependencies with each […]

Experiences of the ECSO WG4 (SME group) meeting

I am representing JAMK University of Applied Sciences in the ECSO Working Group 4 (WG4), which deals with SME issues. I participated the first WG4 meeting on December 2016. The main task for the WG4 is to support SMEs, coordination with countries (in particular East EU) and regions. Institute of Information Technology and JYVSECTEC from […]

JYVSECTEC success story

Construction phase 2010 – 2014 First negotiations about co-operation in research and development program around network and computer security were launched with Finnish industry in December 2010. Those negotiations led to the funding proposal of the JYVSECTEC –program focused to the development environments and to the systems of command, control and surveillance centers. JYVSECTEC –program […]

Cyber exercising to enhance performance

First of all, I will have to confess right at the beginning that my over 30-year career at the Finnish Defence Forces in duties related to cyber security, etc. cannot but show in this text as well. At the Defence Forces, matters related to cyber security had already been systematically developed for decades, long before […]

Christmas greetings

We want to thank our cooperation partners and people we have met. This year has gone quickly and it has included a great diversity of activities ranging from client assignments, development projects and interesting meetings. Foremost in the previous year have been the Finnish Defence Forces National Cyber Exercise, organized cyber security exercise with TeliaSonera […]

Cyber Challenge 2015

Cyber Challenge 2015 was held in connection with Cyber Security & ICT 2015 Exhibition in the congress centre Jyväskylän Paviljonki from 23 to 25 September 2015 and it was open to all fairgoers. We were involved in the challenge as one of the promoters with our two different kinds of puzzles that could be performed […]

Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

The ongoing month is already halfway and soon comes the day when the doors open onto the Cyber Security & ICT 2015 Exhibition that are held in the congress centre Jyväskylän Paviljonki from 23 to 25 September 2015. The exhibitors include leading solution providers in the field of information and cyber security. Come to say […]