By Seppo Heikkinen 22.03.2018

If you are worried about the state of security in your company but don’t really know where to start, then you should consider performing a security assessment to review the current state of your environment.

More

By Suvi Kaartinen 13.12.2017

Do you implement applications that collect people’s personal data - name, phone number, email address, photos, videos, IP addresses - basically anything that can be connected to a person? Did you know that European Union-wide regulation could make your lovingly created application useless after May 2018?

More

By Henry Haverinen 06.11.2017

Let’s zoom in on a classic challenge: how to combine Security Development Lifecycle (SDL) with an agile way of developing software.

More

By Henry Haverinen 24.04.2017

The internet of things (IoT) and Industrial Internet of Things (IIoT) have been hot topics across many industries for the past years. Recent developments in pervasiveness of connectivity, advances in data science and machine learning as well as reductions in the cost and power consumption of hardware are now making it possible for companies to deploy IoT solutions more effortlessly and cost-efficiently than ever before. While there are many examples of IoT solutions generating tremendous value and cost savings for companies, many are still waiting to get started.

More

By Sami Vaittinen 20.04.2017

Developing a highly customized compiler is like being on board the Starship Enterprise.

Travelling deep into the microcosmos of the ARM architecture is nothing short of a journey into your own mind. To plot your uncharted course through the function nebulae unknown to the Vulcan database, to break alien code to subatomic particles and to re-assemble it again with a transporter function, to seek out new algorithms, to boldly go…

More

By Kim Paananen 05.04.2017

One of Intopalo’s main expertise areas is security. Now, as you probably know, software security is pretty important. However, security is a fairly wide area and covers a lot of different fields, tasks, competencies and professional roles under one umbrella concept.

More

By Henry Haverinen 31.03.2017

As a business or a service owner, you have all sorts of priorities. How high does software security rank on your list? Security is one of the cornerstones that can make or break your product.

More

By Mikko Vainikainen 08.03.2017

In information security, military-grade systems are often viewed as the “Champions League” of the business. Think of sovereign state level resourcing, devoted security officers, fortified data centers designed to survive nuclear attacks, heavily armed guards, and so on. National security systems often use the strongest line of cyber defense known to man: strict physical isolation.

More

By Henry Haverinen 24.10.2016

When information security incidents can have impacts to the real physical world, people talk about cyber security. But what does virtual reality have to do with cyber security? Tom’s video report from the Düsseldorf M2M Summit sheds some light on this tricky question.

More

By Henry Haverinen 04.10.2016

Intopalo, a digitalization solution house based in Finland, and INSIDE Secure, a global leader in embedded security, have started a deep collaboration to provide security solutions for critical Industrial Internet and mobile applications.

More