Search result for "cybersecurity"

Cybersecurity as a part of the management team agenda
This year, much has been said about the involvement and responsibility of corporate management in implementing cybersecurity. Several companies have been daunted by cyber crises, and for good reason,...
Articles | Secure Communication
Cybersecurity—the present situation and future challenges
A crisis creates unexpected challenges. In this article, we will examine the present situation and the pandemic’s effect on cybersecurity in Sweden and internationally. We will also look ahead and t...
Articles | Critical Infrastructure | Secure Communication
Cybersecurity for society’s critical functions
Leif Nixon has worked with IT security in all its forms for 20 years. He has both hacked and protected everything from thermostats to supercomputers. Today, he is a security expert at Sectra Communica...
Articles | Secure Communication | Critical Infrastructure
The development of cyber capabilities at an individual level
Citizens’ cyber skills are important not only for them as individuals, but also as an important element in developing national crisis resilience. Citizens’ cyber skill level is directly propor...
Articles | Secure Communication
The cybersecurity of industrial automation systems
Industrial automation systems are a key component of critical infrastructure: They are used to monitor and control, for example, the distribution of electricity and water. Automation systems based on...
Articles | Critical Infrastructure
NFEA — Cybersecurity conference
We welcome you to join Sectra at NFEA cybersecurity event, where focus will be on security for OT systems within critical infrastructure. For more information about the event and to register, visit th...
Event | Managed detection and response | Secure Communication
Cryptography — The cornerstone of cybersecurity
Wanting to keep information secret and inaccessible to others is nothing new—cryptography is something we have used since ancient times. The reason is simple: if sensitive information falls into the...
Articles | Secure Communication
Quantum technology can decipher encryption, but hope is not lost
Quantum technology and its theoretical impact on computer performance has been talked about for a long time, but the debate gained new impetus in October last year when Google’s Sycamore quantum com...
Articles | Secure Communication
Paranoia
We invite you to visit Sectra at Paranoia 2022—one of the largest cybersecurity conferences in the Nordics—where we will demonstrate our 24/7/365 solution for critical infrastructure as well as ou...
Event | Managed detection and response
Patient data is used for blackmail
Psychotherapy Center Vastaamo’s patient data breach and blackmail of patients in October 2020 is a critical example of the emergence of cyber threats. The crime has accumulated the largest numbe...
Articles | Secure Communication | Critical Infrastructure
Sikkerhetsfestivalen 2023
We invite you to visit Sectra at Sikkerhetsfestivalen 2023—Norway’s largest meeting place for cybersecurity—where we will demonstrate our innovative solutions for secure communications, such...
Event | Secure Communication
Co-operation in protecting electric grid from cyber threats
The United States and the Baltic States agreed to co-operate in order to protect the Baltic energy grid from network attacks during the upcoming decoupling and desynchronization of Baltic grid from Ru...
Articles | Critical Infrastructure
Changes in behavior mean stricter cyber security requirements
The coronavirus crisis has turned a lot of things upside down in society, and cyber criminals have not been slow to exploit the situation. According to several IT security companies, there are clear c...
Industry reflections | Secure Communication | Critical Infrastructure
SEC-T
At this year’s SEC-T cybersecurity conference in Stockholm, Sweden, we are thrilled to showcase our cutting-edge products, providing conference attendees the opportunity to experience our cybers...
Event | Managed detection and response
An executive order on the U.S. bulk-power system
The White House issued on May 1, 2020, an Executive Order on Securing the United States Bulk-Power System.1 The executive order states that the cyber threats against the bulk-power system2, and the su...
Articles | Critical Infrastructure
Product | Managed detection and response
Secure communication — Technology only half the picture
Cyberthreats are here to stay, with attacks becoming increasingly common and sophisticated. Secure communication requires a combination of effective technical solutions and an understanding among user...
Articles | Secure Communication
Upcoming events
Sectra attends and exhibits at many industry trade shows, conferences, and events worldwide. Find out here where you can meet us and experience our cybersecurity solutions next—scroll down to filter...
Certifications and approvals
Sectra’s solutions for secure communications are assessed and approved by security authorities in several countries as well as by the EU and NATO. Such impartial certifications provide assurance tha...
Page | Secure Communication
Product | Secure Communication
Product | Secure Communication
Product | Managed detection and response
Product | Secure Communication
Product | Secure Communication
Secure digital collaboration
Raising the level of information and cybersecurity in society is a top priority for the public sector in Sweden. The need for digital collaboration is growing, and in order to quickly and easily commu...
Product | Secure Communication
It’s time to bring security assessments to the board table
While managing risks is a must, proactive security often gets forgotten. Sectra Communications—a company with over 40 years of experience in encryption, secure communications and monitoring of criti...
Industry reflections | Secure Communication | Critical Infrastructure
Detect and adapt to today’s cyber threats
It is crucial for critical infrastructure operations that their ability to detect cybersecurity-related threats and risks is in line with a threat scenario that is constantly changing. This is extreme...
Articles | Critical Infrastructure
Mitigating supply chain attacks
Cyberattacks against the supply chain are among the most troubling risk factors affecting the critical infrastructure segment. In June 2017, an intrusion at a small family business led to the most exp...
Articles | Critical Infrastructure
European Cyber Security Conference
The European Cyber Security Conference returns to Brussels & Online this March for its 9th Edition! Gathering leading policy-makers, industry players, high level cybersecurity and defense experts....
Event | Secure Communication
Accelerating digitization and the virtual power plants of the future
We all know that digitization has been ongoing in society for quite some time. One of the challenges involved in this change in critical operations, such as electricity and water suppliers, is the dig...
Articles | Critical Infrastructure | Secure Communication