IBM Security Forum Nordic
Wednesday morning we attended the IBM Security Forum Nordic, as a continous work to keep a finger on the pulse of industry […]
Wednesday morning we attended the IBM Security Forum Nordic, as a continous work to keep a finger on the pulse of industry […]
A problem introduction Remote access services are usually done through software and can sometimes be complicated to use as well as in […]
The Instance Lab was designed as a mobile cyber range to provide the capability of hosting digital twins and allow for training […]
New paper: On the design of playful training material for information security awareness https://doi.org/10.35199/ICDC.2020.30 Researcher from the CYNIC-project presented a paper during […]
Making the Dead Alive – Dynamic Routines in Risk Management That is the title of Martin Lundgren’s PhD Thesis, that he will […]
The latest article in CYNIC-project is now published: Rethinking capabilities in information security risk management: a systematic literature review Abstract: Information security […]
This website stores cookies on your computer. These cookies are used to provide a more personalized experience and to track your whereabouts around our website in compliance with the European General Data Protection Regulation. If you decide to to opt-out of any future tracking, a cookie will be setup in your browser to remember this choice for one year.
Accept or Deny
