Search results
Industrial businesses often have shortcomings where it concerns the management of one’s organizational assets. While companies continue to define availability of production as vital, they often lack the broad cybersecurity knowledge required, nor do they have extensive security controls in place. It is impossible to properly secure an organization without proper oversight of the factory’s assets. The airgap between IT and ICS/OT is closing, and organizations need to protect themselves by rethinking their security controls. However, the continued focus on efficiency and cost management often creates blind spots for organizations, leading them to completely overlook the business enabling role cybersecurity has. On February 12th 2020, this was one of the central topics discussed at the Nixu ICS event held at The Hague Security Delta in the Netherlands.
You have probably heard numerous tips, such as washing your hands and keeping your distance, to avoid catching the flu or the Corona virus. Hygiene is the number one thing in preventing diseases from spreading. But what about the digital world? Let's talk about cyber hygiene.
Tomorrow Tech is a Finnish technology startup that is owned by its partners, a ten-strong group of top technology experts in Finland. Founded in 2017, the company generated EUR 1.4 million in revenue in 2018.
Nixu Corporation Press release, March 13, 2020 at 14:15 EET
As the number of Coronavirus cases continues to escalate globally, one very concrete consequence has been the dramatic rise in remote working.
Jani had a regular day at the office – except that this wasn’t his office. Jani had infiltrated a company. Meanwhile, Tommi casually walked into a building and grabbed a bunch of confidential documents. Moments later, Markku got inside the company network with targeted malware. What on earth was going on?
Nixu Corporation, Press release on March 16, 2020 at 9:45 AM EET
The Corona virus has provided for challenging times, impacting businesses globally. It is very likely IT security is no longer a top priority for companies, when the only outlook is surviving the current crisis. Of course, companies are handling things to the best of their ability. The current situation reminds me of 2009, when the world was battling the swine flu pandemic. In hindsight, that flu was comparable to the seasonal flu. It looks like the Corona virus is completely different, with far more severe consequences. We are now faced with the same review, and the comparisons are striking.
In Nixu, we have carried out a large number of Privileged Access Management (PAM) projects ranging from advisory to implementation during recent years. We have been asked quite a few times about lessons learned from PAM projects. We gathered some dos and don'ts, so you don't have to learn the hard way.
Nixu Corporation, Press release, March 24, 2020, at 14:45 EET
What should employers consider when handling COVID-19 related personal data? The main message from authorities is that data protection rules (such as the GDPR) do not hinder measures taken to combat COVID-19. We have gathered the key information on a colorful COVID-19 & Privacy infographic.
Nowadays many applications are built for the web using scalable architectures and are running in the cloud. The current Corona virus induced situation is putting these applications to the test. Can the promised resilience and scalability really be achieved?
Vastuu Group, together with its partner cybersecurity company Nixu, has developed a secure digital signature platform SignSpace in Finland.
Press release, March 31, 2020 at 8:05 AM EEST
The usage of video conferencing platforms has surged rapidly. However, security and privacy weaknesses have been found from some of the apps, such as Zoom. Some platforms may not have all the security features on by default. We gathered you some tips on protecting the confidentiality of video conferences and the privacy of users.
What is open-source intelligence, or OSINT? The fourth meetup of the Cyber Security Essentials training program went online as a precaution to stop the coronavirus from spreading, and the OSINT hands-on workshop had to be postponed. However, we at Nixu thought that we could arrange some reading material for self-paced learning for the course participants. Let's have a glimpse of how we can use open-source intelligence, gathering information from public sources, in cybersecurity and what tools are useful.
As Easter is approaching, this is the perfect time to remind you about Easter eggs, salami attacks, backdoors, and other unauthorized or malicious code that your code may have eaten. Easter eggs are meant as entertaining extra features, but other unauthorized features may steal information or cause malfunctions. Let's take a look at different types of unauthorized code and what kind of possibilities you have for finding and blocking it and monitoring for malicious behavior.
Some of the questions I often hear in my work are: which native Microsoft tools should my organization use for monitoring the security of the cloud environment? How can I manage alerts easily? Let's get started with a high-level overview of security monitoring possibilities in the Microsoft 365 ecosystem.
Press release, April 14, 2020 at 11:00 AM EEST