The impact of the cyber resilience act on the product lifecycle

Mathilda Nynäs

The world as we know is constantly changing. The number of connected devices, i.e. devices with an internet connection, is growing faster than ever. By the year 2025, the number of connected devices is predicted to reach 40 billion units, with the number of IoT devices rapidly increasing (Statista 2020). In a world where everything and everyone is connected to the internet, there is a need for comprehensive digital regulations.

Jatka lukemista ”The impact of the cyber resilience act on the product lifecycle”

Will NIS 2 be as problematic as the NIS 1 directive?

Iurii Fedorenko

The NIS 1 directive is one of the legislative measures introduced by the EU in 2016, which was met with positive anticipation. This directive aimed to enhance cyber resilience across the EU, especially within critical sectors such as healthcare, energy, and transportation etc. The directive proposed a common framework that would harmonize the level of cybersecurity among the member states.

Jatka lukemista ”Will NIS 2 be as problematic as the NIS 1 directive?”

How does one address the security threats posed by Unmanned Aerial Systems?

Silhouette of soldier are using drone and laptop computer for scouting during military operation.

Tom Tuunainen

Silhouette of soldier using drone and laptop computer for scouting during military operation.

Unmanned Aerial Systems (UAS) – or more commonly drones – have become very popular in the public and private sector. Armed forces, agricultural industry, law enforcement, meteorological agencies, medical services, environmental companies, and oil refineries are but a few of the users. The use of human activity adds huge value to the evolution of Unmanned Aerial Systems, but it also increases the security risks. Imagine what could happen if smart and cheap drones become weapons at the hands of criminals. Are drones a major threat when it comes to security, and if they are, what measures should be taken to counter them?

Jatka lukemista ”How does one address the security threats posed by Unmanned Aerial Systems?”

Is there a risk on your wrist?

Tom Tuunainen

People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal more. They can also track your fitness activities and health.

Jatka lukemista ”Is there a risk on your wrist?”

Junkmail conversations

Olli Isohanni

Have you been curious what happens if you reply to junk mail? We at Centria SecuLab have tested it so that you do not need to! There is usually little or no danger in the process of receiving and opening a spam message, as long as no links are clicked, or any attachments are downloaded.

Jatka lukemista ”Junkmail conversations”

The Cybersecurity of Robotic Systems

Tom Tuunainen

Controlling a robot from a tablet computer

The market of intelligent machines, which includes autonomous robots, is growing rapidly (Pfeiffer S. 2016). The IFR report shows that over 3 million industrial robots are already operating in factories around the world (IFR 2021). Robots play a crucial role in our society, and they provide vital help in many different fields, such as the medical, industrial, and agricultural sectors.

Jatka lukemista ”The Cybersecurity of Robotic Systems”

Phishing affects us all

Olli Isohanni


Phishing campaigns often use the same formula. An email that contains a link or an attachment is sent to the recipient with the purpose of retrieving data by directing the user to some fake web page on the internet, or by executing a malicious code from an attachment. This text presents the HTML tactic that is used for phishing. The text also presents a few methods which are used to discover and prevent scam emails. Jatka lukemista ”Phishing affects us all”