Security

How a supply chain attack closed one of Sweden’s largest supermarket chains

Last week, when heading out for some groceries, I was met with a note on the entrance to my local grocery store saying the store was closed due to IT problems. Working in IT security this immediately sparked my curiosity. What was going on? I quickly pulled up my mobile phone to check the news. […]

Continue reading

What is compliance and why is it important?

In this conversation with Frank Oestergaard we will cover the topic of compliance for businesses: what it is about, what risks to face and how to combat these.

Continue reading

Follow the conversation


Data breaches – a game of Russian roulette, carefully selected targets or exploiting the circumstances?

From a criminal viewpoint, cybercrime has grown into an international and profitable business, one among other business fields. Behind data breaches one can usually find hacker groups supported by authoritarian governments, independent criminal groups or individuals skilled in information technology who have fallen onto the wrong side of the law, whose day jobs involve scanning through corporate web interfaces for gaps the size of a single line of code or malware.

Continue reading

Learn how Hypercell utilizes IBM Hyper Protect Databases in their service

Hypercell is a Finnish company that provides IoT -services for Smart Cities and their stakeholders. Hypercell’s service produces massive-scale people flow data that helps cities and their stakeholders to develop their services and to optimize their overall eco-system.

Continue reading

How did a health firm get security fast for global COVID-19 vaccine trials?

In this blog, you can learn how Signal Health got security fast for global COVID-19 vaccine trials. Furthermore, I will shortly present the IBM Security MaaS360 with Watson solution. Signant Health was enlisted as the electronic clinical outcome assessment (eCOA) partner for a global pharmaceuticals Phase III COVID-19 vaccine trials, which involved 30,000+ patients in […]

Continue reading

Building your SIEM foundation

According to a recent survey, 60% of companies use 25 or more unique security products, with 44% engaging more than 10 vendors. And 24% percent of respondents surveyed cited the inability to investigate or prioritize security alerts in a timely manner as a challenge due to the global cybersecurity skills shortage. There is a better […]

Continue reading

IBM Security Forum Nordic

Security today is both a business and a technical problem Join our Security Forum to learn how you can better understand and articulate security risks to make better business decisions on your journey to cloud. The digital event will take place on November 18th, 2020 at 09:00 CET. Cybersecurity is no longer simply a technical […]

Continue reading

IBM awards Netic ”Outstanding Security Partner 2020”

Looking at the broad mass of cyber-attacks in recent years – those that have received public attention, as well as those that haven’t – one common denominator stands out, namely; 200 days. 200 days refers to the average time between the onset of a cyber-attack and the time at which the attack is detected. 200 […]

Continue reading

CTO Forum – Cyber Security: Join the discussion

Industries are threatened by rapidly evolving cyberattacks every day. Join our CTO Forum discussion on the successes and challenges in the cyber security arena! The top three topics on CTO’s minds in a recent interview were security, security, and security (just kidding – cloud and AI were 2 and 3). With the ever-evolving cyber threats […]

Continue reading