News

IBM Security Forum Nordic

Posted on
IBM Security Forum Nordic

Wednesday morning we attended the IBM Security Forum Nordic, as a continous work to keep a finger on the pulse of industry trends. The forum was presented as a webcast where we had the opportunity to listen to some of IBM’s top security experts here in the Nordics. During the morning we had the chance […]

News

TOSIBOX®

Posted on

A problem introduction Remote access services are usually done through software and can sometimes be complicated to use as well as in some cases allow for infection of your own computer. In order to allow for secure remote access TOSIBOX® has come up with the solution of using software tied to a USB-stick acting as […]

red-teaming

Instance Lab – Cyber Range

Posted on

The Instance Lab was designed as a mobile cyber range to provide the capability of hosting digital twins and allow for training and gamified exercises regarding Information-, IT-, and Cybersecurity. In this effort, we are happy to announce that Instance Lab is now listed in the report on existing cyber ranges and requirements as provided […]

Publication

On the design of playful training material for information security awareness

Posted on

New paper: On the design of playful training material for information security awareness https://doi.org/10.35199/ICDC.2020.30 Researcher from the CYNIC-project presented a paper during The Sixth International Conference on Design Creativity (ICDC2020) Oulu, Finland, August 26th – 28th 2020.   Abstract: This paper presents the rationale for the design of a card deck game sustaining information security […]

News

Rethinking capabilities in information security risk management

Posted on

The latest article in CYNIC-project is now published: Rethinking capabilities in information security risk management: a systematic literature review Abstract: Information security risk management capabilities have predominantly focused on instrumental onsets, while largely ignoring the underlying intentions and knowledge these management practices entail. This article aims to study what capabilities are embedded in information security […]