Petri Kairinen's presentation material on May 15, 2019 at the Danske Bank's Finnish Small & Mid Cap Day.
Search results
Bug bounty programs have proven to be a great addition to an organization’s cybersecurity palette. Yet, the concept is still rather unknown and faces a lot of prejudice. Is ‘bug bounty hunter’ just a nice new name for a hacker with good intentions? Are bug hunters stealing security consultants’ jobs? Our very own Cybersecurity Consultant Joosua Santasalo is ready to break some common misconceptions about bug bounty hunting.
Nixu Corporation
Press release on May 16, 2019 at 13.05 EEST
A new internal portal in a bank was running smoothly. Then a trusted site host suspended their services because of unpaid invoices. Project lead Jessica just thought they had mixed up their bookkeeping. What no one could have imagined was that a banking Trojan had found its way between the transactions. This customer story may have happened somehow, somewhere. Welcome to the world of cyber noir.
From a security perspective, workstations (desktops, laptops, smartphones) can never be completely controlled, equating to a plethora of possible breaches CISOs must foresee and navigate. Simply advising employees to be wary of predatory behavior from unknown attackers is not sufficient. Knowing a) what to protect, b) which possible dangers exist and c) who the hypothetical attackers are, is necessary for every CISO.
Nixu Corporation
Press release, May 12, 2017 at 8:00 AM EET
INDUSTRIAL IOT INNOVATION RECEIVES INTERNATIONAL RECOGNITION
The challenges around remote access have been known, addressed and managed for what feels like ages. In spite of this, there are regular intervals, new inserts or stories where the remote accesses to critical infrastructure control systems are misused or just poorly managed. So why is remote access to critical infrastructure, or industrial control systems in general hard to achieve?
Nixu Corporation
Press release, June 5, 2019 at 10.00 am EEST
Nixu Corporation
Press release 12.6.2019 at 10.20 EEST
Nixu Oyj
Press release, March 15, 2017
Free for publication at 10:00 a.m.
Nixu Corporation Press release, June 28, 2019 at 9.20 AM EEST
Nixu Corporation Press release on June 28, 2019 at 11.00 AM EEST
Nixu Corporation
Press release 1.7.2019 at 10.25 EEST
IT security essentially reduces information-related risk to an acceptable ratio of risk to cost. For this reason, the process begins with an extensive risk assessment – a tried and tested process that can be improved. I am inspired by the work of Douglas Hubbard on this topic. Here’s why.
As per July 1st, Suzanne Rijnbergen, MBA joins the Nixu team in Amsterdam to head our Cyber Defence Center (CDC) in the Benelux.
IT security essentially reduces information related risk to an acceptable ratio of risk to cost. For this reason, the process begins with an extensive risk assessment – a tried and tested process that can be improved. I am inspired by the work of Douglas W. Hubbard on this topic. Here’s why ‘Part II’.