If you are worried about the state of security in your company but don’t really know where to start, then you should consider performing a security assessment to review the current state of your environment.
Do you implement applications that collect people’s personal data - name, phone number, email address, photos, videos, IP addresses - basically anything that can be connected to a person? Did you know that European Union-wide regulation could make your lovingly created application useless after May 2018?
Let’s zoom in on a classic challenge: how to combine Security Development Lifecycle (SDL) with an agile way of developing software.
The internet of things (IoT) and Industrial Internet of Things (IIoT) have been hot topics across many industries for the past years. Recent developments in pervasiveness of connectivity, advances in data science and machine learning as well as reductions in the cost and power consumption of hardware are now making it possible for companies to deploy IoT solutions more effortlessly and cost-efficiently than ever before. While there are many examples of IoT solutions generating tremendous value and cost savings for companies, many are still waiting to get started.
Developing a highly customized compiler is like being on board the Starship Enterprise.
Travelling deep into the microcosmos of the ARM architecture is nothing short of a journey into your own mind. To plot your uncharted course through the function nebulae unknown to the Vulcan database, to break alien code to subatomic particles and to re-assemble it again with a transporter function, to seek out new algorithms, to boldly go…
As a business or a service owner, you have all sorts of priorities. How high does software security rank on your list? Security is one of the cornerstones that can make or break your product.
In information security, military-grade systems are often viewed as the “Champions League” of the business. Think of sovereign state level resourcing, devoted security officers, fortified data centers designed to survive nuclear attacks, heavily armed guards, and so on. National security systems often use the strongest line of cyber defense known to man: strict physical isolation.
Back in 2007, when I was studying Automation Engineering at the Tampere University of Technology, I never thought that one day I would be an IT security specialist in a high-tech company.
And yet, 10 years later, here I am! Here’s how my and Intopalo’s paths crossed and finally intertwined.
Security and privacy issues have grabbed headlines in recent years. Almost daily, the news describe the latest Snowden leaks about government agencies and hacker groups compromising critical systems, stealing private data and money.