News and insights

Slider
Review of Pedagogical Principles of Cyber Security Exercises

Review of Pedagogical Principles of Cyber Security Exercises

Publication
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another...
Read More
Model Fooling Attacks Against Medical Imaging: A Short Survey

Model Fooling Attacks Against Medical Imaging: A Short Survey

Publication
This study aims to find a list of methods to fool artificial neural networks used in medical imaging. We collected...
Read More
The National Cyber Security Exercise 2020

The National Cyber Security Exercise 2020

News
The Institute of Information Technology of JAMK University of Applied Sciences and JYVSECTEC are organizing the National Cyber ​​Security Exercise...
Read More
Model for Cyber Security Information Sharing in Healthcare Sector

Model for Cyber Security Information Sharing in Healthcare Sector

Publication
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an...
Read More
CISS2020-OL: Attacking the Secure Water Treatment testbed

CISS2020-OL: Attacking the Secure Water Treatment testbed

Blog
JYVSECTEC Red Team participated in CISS2020-OL Critical Infrastructure Security Showdown 2020 Online competition and placed 3rd out of 17 teams....
Read More
Adding Realism to Cyber Security Exercises – Populating RGCE environment

Adding Realism to Cyber Security Exercises – Populating RGCE environment

Blog
Our Realistic Global Cyber Environment (RGCE) is a feature rich live cyber range that brings together a realistic global world and...
Read More
Statistical Evaluation of Artificial Intelligence -Based Intrusion Detection System

Statistical Evaluation of Artificial Intelligence -Based Intrusion Detection System

Publication
Training neural networks with captured real-world network data may fail to ascertain whether or not the network architecture is capable...
Read More
Continuous integration in collaborative analysis of incidents = CINCAN

Continuous integration in collaborative analysis of incidents = CINCAN

Blog
Some say all good things must come to an end. The CINCAN project started in 2018 and this 2-year project,...
Read More
Carry out investigations remotely using containerized GRR

Carry out investigations remotely using containerized GRR

Blog
The containerized GRR is a forked version of GRR Rapid Response, incident response framework designed by Google engineers. In today’s...
Read More
JAMK High Performance Computing

JAMK High Performance Computing

Publication
JAMK has two Data Analytics projects funded by European Regional Development Fund (ERDF): New Business Innovations from Data Analytics and...
Read More
Survey on Existing Cyber Ranges, their Features and Federation

Survey on Existing Cyber Ranges, their Features and Federation

News
Cyber range technologies, products and national and international initiatives have developed greatly within the last few years. There are several...
Read More
Deploy the containerized GRR to unmask the intruders

Deploy the containerized GRR to unmask the intruders

Blog
Containerized GRR is a forked implementation of the GRR Rapid Response, a tool for incident response designed and developed by...
Read More
Police and organisations join forces in the control of cybercrime

Police and organisations join forces in the control of cybercrime

Blog
There are great sighs of relief among cyber criminals because the systems in use in organisations are not up to...
Read More
Experiences with Hardened Firefox

Experiences with Hardened Firefox

Blog
After studying Internet user tracking and how to avoid it in my Thesis, I decided to experiment with Firefox privacy...
Read More
Prepare, Hunt, and Respond – conceptual model

Prepare, Hunt, and Respond – conceptual model

News
We have released a comprehensive model for organizations to prepare themselves against cyber attacks. As the world is evolving to...
Read More
Why are we sensitive to cyber attack

Why are we sensitive to cyber attack

Blog
In the digital world, whenever we click on something and reply to some request for information, we are at every...
Read More
Security authorities develop their competence in National Cyber Security Exercise (KYHA19)

Security authorities develop their competence in National Cyber Security Exercise (KYHA19)

News
We organize the second national cyber security exercise, in short KYHA19tv (security authorities) 25-29 November 2019 at JAMK University of...
Read More
A Design Model for a Degree Programme in Cyber Security

A Design Model for a Degree Programme in Cyber Security

Publication
The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree...
Read More
Tool for extracting possible IoC information from files

Tool for extracting possible IoC information from files

Blog
This blog post presents a tool called ioc_strings that can be used to gather relevant technical information from file strings....
Read More
Increasing awareness of cybercrimes with #OleTietoinen campaign (Be Aware)

Increasing awareness of cybercrimes with #OleTietoinen campaign (Be Aware)

News
Cybercrime is a rapidly evolving and complex form of crime and anyone of us can be the target. With the...
Read More
Cyber security in the healthcare sector Conference

Cyber security in the healthcare sector Conference

News
We are organising Cyber security in the healthcare sector conference together with the European Cyber Security Organisation ECSO, Regional Council...
Read More
Network Anomaly Detection Based on WaveNet

Network Anomaly Detection Based on WaveNet

Publication
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including...
Read More
Pedagogical Aspects of Cyber Security Exercises

Pedagogical Aspects of Cyber Security Exercises

Publication
Cyber security exercises (CSE) are complex learning experiences aimed at developing expert knowledge and competence through simulation. In this paper...
Read More
National Cyber Security Exercise 2019 is over or is it?

National Cyber Security Exercise 2019 is over or is it?

Blog
Week 21 was the actual exercise week for the national cyber security exercise. The immense planning and implementation work led...
Read More
The state administration of Finland will organize a national cyber security exercise

The state administration of Finland will organize a national cyber security exercise

News
The Cyber ​​Security Research, Development and Training Centre, JYVSECTEC, (Jyväskylä Security Technology), together with the Secretariat of The Security Committee...
Read More
Optimising and securing Dockerfiles

Optimising and securing Dockerfiles

Blog
In an earlier post, Analysing malicious PDF documents using Dockerized tools, we covered the use of some PDF analysis tools we...
Read More
Requirements for Training and Evaluation Dataset of Network and Host Intrusion Detection System

Requirements for Training and Evaluation Dataset of Network and Host Intrusion Detection System

Publication
In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor...
Read More
Disobey – The Nordic Security Event

Disobey – The Nordic Security Event

Blog
Disobey, the annual Nordic security event was held on 11th-12th of January 2019 at Kaapelitehdas, Helsinki. The group of JYVSECTEC...
Read More
JAMK participates in a significant cybersecurity project gaining almost half a million EUR of 16-million-EUR budget

JAMK participates in a significant cybersecurity project gaining almost half a million EUR of 16-million-EUR budget

News
JAMK University of Applied Sciences is a participant in a significant cybersecurity project in the EU Commission’s Horizon 2020 programme....
Read More
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders

Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders

Publication
The number of intrusions and attacks against data networks and networked systems increases constantly, while encryption has made it more...
Read More
Analysing malicious PDF documents using Dockerized tools

Analysing malicious PDF documents using Dockerized tools

Blog
One of the goals of the CinCan project is to provide tools that automate the repetitive tasks of malware analysis...
Read More
Development of cyber security in healthcare sector improves patient security

Development of cyber security in healthcare sector improves patient security

News
Healthcare Cyber Range project started at the Institute of Information Technology at JAMK University of Applied Sciences creates a cyber...
Read More
Finnish cyber security expertise in Singapore – JAMK University of Applied Sciences and Singapore Polytechnic collaborating in Centre of Excellence in Applied Cyber Security

Finnish cyber security expertise in Singapore – JAMK University of Applied Sciences and Singapore Polytechnic collaborating in Centre of Excellence in Applied Cyber Security

News
JAMK University of Applied Sciences and Singapore Polytechnic have signed a Memorandum of Understanding in Singapore. The Parties wish to...
Read More
From trainee to employee

From trainee to employee

Blog
Practical training is an important part of studies and has a special part in education. Training period gives an excellent...
Read More
User Tracking in Internet

User Tracking in Internet

Blog
User tracking has gained interest after it has become a major source of revenue for advertisers. Tracking methods have evolved...
Read More
We are involved in the preparatory work of the Cyber Growth Program

We are involved in the preparatory work of the Cyber Growth Program

News
We are involved in the preparatory work of the Cyber Growth Program of Finland together with representatives of the academic...
Read More
We are seeking for Specialist / Key Account Manager

We are seeking for Specialist / Key Account Manager

News
JYVSECTEC - Jyväskylä Security Technology is the leading independent cyber security research, development, and training center in Finland. We operate...
Read More
Smart Factory 2018 Exhibition 20.-22.11.2018

Smart Factory 2018 Exhibition 20.-22.11.2018

News
Smart Factory 2018 Exhibition is held in in the congress centre Jyväskylä Paviljonki for the first time. The focus of...
Read More
Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises

Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises

Publication
Cyber security exercises allow individuals and organisations to train and test their skills in complex cyber attack situations. In order...
Read More
Air Navigation Services Finland Oy (ANS Finland) cybersecurity exercise in 2018

Air Navigation Services Finland Oy (ANS Finland) cybersecurity exercise in 2018

Case
ANS Finland performed a cybersecurity exercise with JYVSECTEC 24 -25 January 2018. The aim of the exercise was to test...
Read More
Kaisanet prepares for cyber-attacks with exercises

Kaisanet prepares for cyber-attacks with exercises

Case
Cyber incidents can be prepared for and threats mitigated through technology and technical expertise of personnel. Not all threats can...
Read More
RGCE organizational environments

RGCE organizational environments

Blog
JYVSECTEC’s cyber range RGCE has been in development since 2011 aiming to provide a realistic exercise environment for organizations of different sizes...
Read More
Appointments at JAMK

Appointments at JAMK

News
As from 7 August 2017, JAMK University of Applied Sciences has appointed Mr. Mika Karjalainen as Director of the Institute...
Read More
JYVSECTEC at Subcontracting fair on September

JYVSECTEC at Subcontracting fair on September

News
We are participating in Subcontracting trade fair on 26. – 28.9.2017 held in Tampere. This year Subcontracting trade fair is...
Read More
FINCSC incorporated as part of the Implementation Programme for Finland’s Cyber Security Strategy

FINCSC incorporated as part of the Implementation Programme for Finland’s Cyber Security Strategy

News
On 20 April 2017, the Security Committee approved the Implementation Programme for Finland’s Cyber Security Strategy for 2017–2020 that had...
Read More
Fifth national Cyber Security Exercise in May

Fifth national Cyber Security Exercise in May

News
Ministry of Defence of Finland and the The Security Committee of Finland organise the fifth national cyber exercise with JYVSECTEC cyber...
Read More
Experiences of the ECSO WG4 (SME group) meeting

Experiences of the ECSO WG4 (SME group) meeting

Blog
I am representing JAMK University of Applied Sciences in the ECSO Working Group 4 (WG4), which deals with SME issues....
Read More
Cyber exercises for operators in the industry sector was piloted

Cyber exercises for operators in the industry sector was piloted

News
The scope of JYVSECTEC’s cyber exercise activities expands to also cover industrial automation environments. As part of the the cyber...
Read More
JYVSECTEC success story

JYVSECTEC success story

Blog
Construction phase 2010 – 2014 First negotiations about co-operation in research and development program around network and computer security were...
Read More
The Director of Institute of Information Technology has changed

The Director of Institute of Information Technology has changed

News
Jarmo Siltanen’s, director of JAMK’s Institute of Information Technology, employment at JAMK University of Applied Sciences has ended. He will...
Read More
On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks

On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks

Publication
Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks...
Read More
Cyber exercising to enhance performance

Cyber exercising to enhance performance

Blog
First of all, I will have to confess right at the beginning that my over 30-year career at the Finnish...
Read More
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

Publication
Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate...
Read More
Architecture for the Cyber Security Situational Awareness System

Architecture for the Cyber Security Situational Awareness System

Publication
Networked software systems have a remarkable and critical role in the modern society. There are critical software systems in every...
Read More
Institute of Information Technology and JYVSECTEC as part of it joins the founder members of ECSO

Institute of Information Technology and JYVSECTEC as part of it joins the founder members of ECSO

News
European Commission and European Cyber Security Organization (ECSO) ASBL have signed the contract for a Public-Private Partnership for a strategic...
Read More
European Defence Agency’s training environment comes to Jyväskylä

European Defence Agency’s training environment comes to Jyväskylä

News
Finland is involved in the cyber security project of European Defence Agency EDA and takes a leading role of the...
Read More
Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic

Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic

Publication
Nowadays, zero-day Denial-of-Service (DoS) attacks become frighteningly common in high-speed networks due to constantly increasing number of vulnerabilities. Moreover, these...
Read More
Model for Sharing the Information of Cyber Security Situation Awareness between Organizations

Model for Sharing the Information of Cyber Security Situation Awareness between Organizations

Publication
Exchanging of Situation Awareness information is extremely important for organizations in order to survive as part of the cyber domain....
Read More
Finnish National Cyber Exercise KYHA16 brings authorities together in Jyväskylä

Finnish National Cyber Exercise KYHA16 brings authorities together in Jyväskylä

News
The Ministry of Finance and the Finnish Defence Forces C5 Agency organizes the National Cyber Exercise together with cyber security...
Read More
JYVSECTEC participated Locked Shields 2016 exercise

JYVSECTEC participated Locked Shields 2016 exercise

News
JYVSECTEC participated in Locked Shields 2016 cyber defence exercise in Tallinn, Estonia. The exercise was held between April 18 –...
Read More
JYVSECTEC organizes an Information Security Event for Higher Education

JYVSECTEC organizes an Information Security Event for Higher Education

News
JYVSECTEC organizes an annual information security event Korkeakoulujen tietoturvapäivät for higher educational institutions on March 15th and 16th. This year the...
Read More
Christmas greetings

Christmas greetings

Blog
We want to thank our cooperation partners and people we have met. This year has gone quickly and it has...
Read More
Cyber Challenge 2015

Cyber Challenge 2015

Blog
Cyber Challenge 2015 was held in connection with Cyber Security & ICT 2015 Exhibition in the congress centre Jyväskylän Paviljonki...
Read More
Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

Blog
The ongoing month is already halfway and soon comes the day when the doors open onto the Cyber Security &...
Read More
Upcomming events for autumn 2015

Upcomming events for autumn 2015

News
Summer is almost over and it’s time to get back to everyday life. This autumn brings us versatile and interesting...
Read More
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

Publication
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose...
Read More
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Publication
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises...
Read More
Online detection of anomalous network flows with soft clustering

Online detection of anomalous network flows with soft clustering

Publication
In this study, we apply an anomaly-based approach to analyze traffic flows transferred over a network to detect the flows...
Read More
Analysis of HTTP Requests for Anomaly Detection of Web Attacks

Analysis of HTTP Requests for Anomaly Detection of Web Attacks

Publication
Attacks against web servers and web-based applications remain a serious global network security threat. Attackers are able to compromise web...
Read More

In JYVSECTEC's blog, we present the knowledge, ideas and experiences of cyber security in the activities of Jyväskylä University of Applied Sciences. The texts provide current insights on cyber security and build a reliable image of strong Finnish cyber security expertise.

The editorial board of JYVSECTEC blog: Tuukka Laava, Kaisa Sulasalmi and Heli Sutinen.

Slider