Search results
News and advice related to the coronavirus are everywhere. People are working from home, and everyday life has changed. In the cyber world, the change hasn't been that significant. Yes, there are phishing campaigns impersonating the World Health Organization, and malware is being spread with the help of COVID-19 keywords. But if you look at the numbers, there is no noticeable change in the overall amount of attacks.
Nixu Corporation, Press release on April 16 at 9:05 AM EEST
Static code analysis – check. Scanning for vulnerable components – sure. Dynamic application testing – check. Penetration testing – check. Too many security testing reports – check! If you have invested in application security but feel like you are getting lost in all the reports or don't even know if the tools are being used, Application Security Orchestration and Correlation is something for you.
Amazon Web Services, Microsoft Azure, Google Cloud – how to select the right platform? Or, going for multi-cloud? Why not! You can select the best features of all platforms and avoid vendor lock-in. On the other hand, a multi-cloud environment can increase your security risks as the infrastructure gets complicated, and gaining proper visibility is more difficult. Read about multi-cloud pain points and what you can do to address them.
Mad@Work is the short name for the project ITEA3 Mental Wellbeing Management and Productivity Boosting in the Workplace. It's a VTT study project that focuses on the detection of mitigation of employees' poor mental health conditions to prevent associated health risks. The goal of the project is to develop new human resource management solutions to improve workplace conditions and employee wellbeing. The solutions will combine data from a range of environmental sensors and wearable data sources in a privacy-safe and unobtrusive way. Nixu is one of the companies participating in the project and focuses on privacy-by-design software development and personal data control with MyData principles.
During a crisis, people tend to criticize the ones that were supposed to prepare for it. Whatever has been done, it’s not good enough: There was too little preparation, the response was too late. But before the crisis existed the same people often were criticized too: Their proposed measures were too expensive and too restrictive. The difference is that we prepare for a risk, but we have to deal with a problem.
Nixu Corporation, Press release on May 6, 2020 at 10:05 AM EEST
As CIO and CISO, you continuously need to make decisions. Some decisions force you to go one way or the other – you cannot have both. Management relies on your expertise, and they have empowered you to make the right decisions when it comes to cyber risks, finance, and competences. But do you have the knowledge and the overview when it comes to the constantly changing cybersecurity landscape? Do you know what are your organization's priority needs in cybersecurity?
Our Thursday morning webinar on the 7th of May was about cybersecurity awareness. Thomas Wong, a Principal Security Consultant from Nixu Denmark, went through some dos and don'ts of setting up a cybersecurity awareness program. Stats about phishing and awareness program tips – an excellent way to spend a coffee break, right?
Cloud Access Security Broker (CASB) is a solution that packages essential cloud ecosystem security features: visibility, data security, threat protection, and compliance. There are many CASB providers, so you need to understand what kind of cloud services you are looking to protect and think about use cases so that you can select the best CASB for your organization.
Nixu Corporation, Press release May 13 at 11:30 AM EEST
Social engineering was the topic of the fifth meetup of the Cyber Security Essentials training program. The meetup was held online, which suits the subject pretty well – after all, we encounter a lot of social engineering attempts in the form of phishing and other online scams. It turned out that social engineering online is super easy. If you learn it too, you'll have better chances of detecting scams.
Mad@Work is a study project that focuses on mental wellbeing management and productivity-boosting in the workplace. Nixu is one of the companies participating in the project and focuses on privacy-by-design software development and personal data control with MyData principles. As a part of the Mad at Work project, Nixu is developing a privacy threat modeling method for use in highly complex human-centric systems. But what exactly is privacy threat modeling?
Nixu Corporation, Press release on May 25, 2020 at 15:35 EEST
Nixu Corporation, Press release May 26, 2020 at 10.02 AM EEST
Nixu Corporation, Press release on May 27 at 14.10 EEST
Your expensive scanners might be producing reports that nobody cares to read. Maybe you didn't even install the tools in the first place. Ari Kesäniemi and Matti Suominen revealed five typical reasons why organizations are failing at DevSecOps and how you can tackle the problems.
When it comes to modern identity management, and privacy-aware design, the term MyData keeps popping up. Also, in the Mad@Work research project that focuses on mental wellbeing management in the workplace, Nixu supports the implementation of MyData principles. But what does MyData mean in practice?
Vulnerability scanning helps you identify and fix problems before a cybercriminal can exploit weaknesses in your systems and cause severe problems. We have composed an overview of everything you need to know about vulnerability scanning.
Want to learn more about cybersecurity? Or maybe you'd like to improve your security posture at home or in the office? Here's your chance! Take our 30 Days of Cybersecurity Challenge and take a small step towards enhanced security every day. Share your progress and win!