Nixu Corporation, Press release, March 30, 2021 at 13.00 EEST
Nixu Corporation, Stock Exchange release, March 30, 2021 at 18.45 EEST
Applications get new features every day, and at the same time, security functions change. How do developers and architects keep up? Nixu’s cybersecurity expert Teo Selenius started to keep a blog to keep his findings in order, and to share the latest features. Appsecmonkey.com is growing rapidly.
Every year, 4 billion paper documents are sent to enable Trade Finance globally, meaning all the required data shared between the stakeholders in the process, e.g., contracts and documents between the customer, the provider, their banks, and t
Outokumpu, a global leader in stainless steel manufacturing, has found multiple benefits in outsourcing their IT security monitoring to Nixu Cyber Defense Center.
Nixu Corporation, Press release, April 15, 2021 at 8:35 AM EEST
Nixu Corporation, Stock Exchange release, April 15, 2021 at 8.30 AM EEST
Nixu Corporation, Press release April 15, 2021 at 12.30 PM EEST
Nixu Corporation, Press release, April 16 at 8.10 AM EEST
Nixu Corporation, managers' transactions, April 22, 2021, at 10.10 EEST
Nixu Corporation, managers' transactions, April 22, 2021, at 10.10 EEST
Nixu Corporation, managers' transactions, April 22, 2021, at 10.10 EEST
Nixu Corporation, managers' transactions, April 22, 2021, at 10.10 EEST
Nixu Corporation, managers' transactions, April 22, 2021, at 10.10 EEST
Nixu Corporation, managers' transactions, April 22, 2021, at 10.10 EEST
Nixu’s cybersecurity consultant Aapo Oksman has been researching vulnerabilities that allow intercepting secure network connections made by devices and software. The research revealed a vulnerability in the App Store application in the Apple iOS. This vulnerability allows an attacker to listen in and alter network traffic made by some parts of the App Store application.
Nixu Corporation, Press release May 24, 2021 at 8.30 AM EEST
Nixu is one of the founders of the Findy Co-operative, which is an unique, open-to-all organization based on public-private collaboration.
Corporate information security, part 1 — Why can’t I invest in information security like I can in green companies?
Corporate information security, part 2 — What cyber threats can companies face, and how to identify them?