News and insights

Slider
National Cyber Security Exercise 2019 is over or is it?

National Cyber Security Exercise 2019 is over or is it?

Blog
Week 21 was the actual exercise week for the national cyber security exercise. The immense planning and implementation work led...
Read More
The state administration of Finland will organize a national cyber security exercise

The state administration of Finland will organize a national cyber security exercise

News
The Cyber ​​Security Research, Development and Training Centre, JYVSECTEC, (Jyväskylä Security Technology), together with the Secretariat of The Security Committee...
Read More
Optimising and securing Dockerfiles

Optimising and securing Dockerfiles

Blog
In an earlier post, Analysing malicious PDF documents using Dockerized tools, we covered the use of some PDF analysis tools we...
Read More
Requirements for Training and Evaluation Dataset of Network and Host Intrusion Detection System

Requirements for Training and Evaluation Dataset of Network and Host Intrusion Detection System

Publication
In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor...
Read More
Disobey – The Nordic Security Event

Disobey – The Nordic Security Event

Blog
Disobey, the annual Nordic security event was held on 11th-12th of January 2019 at Kaapelitehdas, Helsinki. The group of JYVSECTEC...
Read More
JAMK participates in a significant cybersecurity project gaining almost half a million EUR of 16-million-EUR budget

JAMK participates in a significant cybersecurity project gaining almost half a million EUR of 16-million-EUR budget

News
JAMK University of Applied Sciences is a participant in a significant cybersecurity project in the EU Commission’s Horizon 2020 programme....
Read More
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders

Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders

Publication
The number of intrusions and attacks against data networks and networked systems increases constantly, while encryption has made it more...
Read More
Analysing malicious PDF documents using Dockerized tools

Analysing malicious PDF documents using Dockerized tools

Blog
One of the goals of the CinCan project is to provide tools that automate the repetitive tasks of malware analysis...
Read More
Development of cyber security in healthcare sector improves patient security

Development of cyber security in healthcare sector improves patient security

News
Healthcare Cyber Range project started at the Institute of Information Technology at JAMK University of Applied Sciences creates a cyber...
Read More
Finnish cyber security expertise in Singapore – JAMK University of Applied Sciences and Singapore Polytechnic collaborating in Centre of Excellence in Applied Cyber Security

Finnish cyber security expertise in Singapore – JAMK University of Applied Sciences and Singapore Polytechnic collaborating in Centre of Excellence in Applied Cyber Security

News
JAMK University of Applied Sciences and Singapore Polytechnic have signed a Memorandum of Understanding in Singapore. The Parties wish to...
Read More
From trainee to employee

From trainee to employee

Blog
Practical training is an important part of studies and has a special part in education. Training period gives an excellent...
Read More
User Tracking in Internet

User Tracking in Internet

Blog
User tracking has gained interest after it has become a major source of revenue for advertisers. Tracking methods have evolved...
Read More
We are involved in the preparatory work of the Cyber Growth Program

We are involved in the preparatory work of the Cyber Growth Program

News
We are involved in the preparatory work of the Cyber Growth Program of Finland together with representatives of the academic...
Read More
We are seeking for Specialist / Key Account Manager

We are seeking for Specialist / Key Account Manager

News
JYVSECTEC - Jyväskylä Security Technology is the leading independent cyber security research, development, and training center in Finland. We operate...
Read More
Smart Factory 2018 Exhibition 20.-22.11.2018

Smart Factory 2018 Exhibition 20.-22.11.2018

News
Smart Factory 2018 Exhibition is held in in the congress centre Jyväskylä Paviljonki for the first time. The focus of...
Read More
Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises

Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises

Publication
Cyber security exercises allow individuals and organisations to train and test their skills in complex cyber attack situations. In order...
Read More
Air Navigation Services Finland Oy (ANS Finland) cybersecurity exercise in 2018

Air Navigation Services Finland Oy (ANS Finland) cybersecurity exercise in 2018

Case
ANS Finland performed a cybersecurity exercise with JYVSECTEC 24 -25 January 2018. The aim of the exercise was to test...
Read More
Kaisanet prepares for cyber-attacks with exercises

Kaisanet prepares for cyber-attacks with exercises

Case
Cyber incidents can be prepared for and threats mitigated through technology and technical expertise of personnel. Not all threats can...
Read More
RGCE organizational environments

RGCE organizational environments

Blog
JYVSECTEC’s cyber range RGCE has been in development since 2011 aiming to provide a realistic exercise environment for organizations of different sizes...
Read More
Appointments at JAMK

Appointments at JAMK

News
As from 7 August 2017, JAMK University of Applied Sciences has appointed Mr. Mika Karjalainen as Director of the Institute...
Read More
JYVSECTEC at Subcontracting fair on September

JYVSECTEC at Subcontracting fair on September

News
We are participating in Subcontracting trade fair on 26. – 28.9.2017 held in Tampere. This year Subcontracting trade fair is...
Read More
FINCSC incorporated as part of the Implementation Programme for Finland’s Cyber Security Strategy

FINCSC incorporated as part of the Implementation Programme for Finland’s Cyber Security Strategy

News
On 20 April 2017, the Security Committee approved the Implementation Programme for Finland’s Cyber Security Strategy for 2017–2020 that had...
Read More
Fifth national Cyber Security Exercise in May

Fifth national Cyber Security Exercise in May

News
Ministry of Defence of Finland and the The Security Committee of Finland organise the fifth national cyber exercise with JYVSECTEC cyber...
Read More
Experiences of the ECSO WG4 (SME group) meeting

Experiences of the ECSO WG4 (SME group) meeting

Blog
I am representing JAMK University of Applied Sciences in the ECSO Working Group 4 (WG4), which deals with SME issues....
Read More
Cyber exercises for operators in the industry sector was piloted

Cyber exercises for operators in the industry sector was piloted

News
The scope of JYVSECTEC’s cyber exercise activities expands to also cover industrial automation environments. As part of the the cyber...
Read More
JYVSECTEC success story

JYVSECTEC success story

Blog
Construction phase 2010 – 2014 First negotiations about co-operation in research and development program around network and computer security were...
Read More
The Director of Institute of Information Technology has changed

The Director of Institute of Information Technology has changed

News
Jarmo Siltanen’s, director of JAMK’s Institute of Information Technology, employment at JAMK University of Applied Sciences has ended. He will...
Read More
On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks

On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks

Publication
Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks...
Read More
Cyber exercising to enhance performance

Cyber exercising to enhance performance

Blog
First of all, I will have to confess right at the beginning that my over 30-year career at the Finnish...
Read More
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

Publication
Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate...
Read More
Architecture for the Cyber Security Situational Awareness System

Architecture for the Cyber Security Situational Awareness System

Publication
Networked software systems have a remarkable and critical role in the modern society. There are critical software systems in every...
Read More
Institute of Information Technology and JYVSECTEC as part of it joins the founder members of ECSO

Institute of Information Technology and JYVSECTEC as part of it joins the founder members of ECSO

News
European Commission and European Cyber Security Organization (ECSO) ASBL have signed the contract for a Public-Private Partnership for a strategic...
Read More
European Defence Agency’s training environment comes to Jyväskylä

European Defence Agency’s training environment comes to Jyväskylä

News
Finland is involved in the cyber security project of European Defence Agency EDA and takes a leading role of the...
Read More
Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic

Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic

Publication
Nowadays, zero-day Denial-of-Service (DoS) attacks become frighteningly common in high-speed networks due to constantly increasing number of vulnerabilities. Moreover, these...
Read More
Model for Sharing the Information of Cyber Security Situation Awareness between Organizations

Model for Sharing the Information of Cyber Security Situation Awareness between Organizations

Publication
Exchanging of Situation Awareness information is extremely important for organizations in order to survive as part of the cyber domain....
Read More
Finnish National Cyber Exercise KYHA16 brings authorities together in Jyväskylä

Finnish National Cyber Exercise KYHA16 brings authorities together in Jyväskylä

News
The Ministry of Finance and the Finnish Defence Forces C5 Agency organizes the National Cyber Exercise together with cyber security...
Read More
JYVSECTEC participated Locked Shields 2016 exercise

JYVSECTEC participated Locked Shields 2016 exercise

News
JYVSECTEC participated in Locked Shields 2016 cyber defence exercise in Tallinn, Estonia. The exercise was held between April 18 –...
Read More
JYVSECTEC organizes an Information Security Event for Higher Education

JYVSECTEC organizes an Information Security Event for Higher Education

News
JYVSECTEC organizes an annual information security event Korkeakoulujen tietoturvapäivät for higher educational institutions on March 15th and 16th. This year the...
Read More
Christmas greetings

Christmas greetings

Blog
We want to thank our cooperation partners and people we have met. This year has gone quickly and it has...
Read More
Cyber Challenge 2015

Cyber Challenge 2015

Blog
Cyber Challenge 2015 was held in connection with Cyber Security & ICT 2015 Exhibition in the congress centre Jyväskylän Paviljonki...
Read More
Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

Blog
The ongoing month is already halfway and soon comes the day when the doors open onto the Cyber Security &...
Read More
Upcomming events for autumn 2015

Upcomming events for autumn 2015

News
Summer is almost over and it’s time to get back to everyday life. This autumn brings us versatile and interesting...
Read More
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

Publication
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose...
Read More
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Publication
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises...
Read More
Online detection of anomalous network flows with soft clustering

Online detection of anomalous network flows with soft clustering

Publication
In this study, we apply an anomaly-based approach to analyze traffic flows transferred over a network to detect the flows...
Read More
Analysis of HTTP Requests for Anomaly Detection of Web Attacks

Analysis of HTTP Requests for Anomaly Detection of Web Attacks

Publication
Attacks against web servers and web-based applications remain a serious global network security threat. Attackers are able to compromise web...
Read More
In JYVSECTEC's blog, we present the knowledge, ideas and experiences of cyber security in the activities of Jyväskylä University of Applied Sciences. The texts provide current insights on cyber security and build a reliable image of strong Finnish cyber security expertise.
The editorial board of JYVSECTEC blog: Tuukka Laava, Kaisa Sulasalmi and Heli Sutinen.
Slider