THE NORWEGIAN CYBER SECURITY CULTURE

June 9, 2016

It is a well-known fact that all Norwegians are online. Through this study we have found that Norwegians are confdent that they are able to identify cyber-threats. Still more than half the population is worried falling victim to online fraud and computer viruses. They willingly accept state monitoring, but do not trust that the Police can help them if they fall victim to cyber-crime. On the other hand, almost half the population support vigilante and private law enforcement online. What does this tell us about Norwegian Cyber Security Culture and the prospects of successful digitization of public services and private businesses? Human factors have long time been recognized as fundamental to cyber security. But so far efforts to understand this important phenomenon has been limited in scope. NorSIS sees mapping cyber security culture as a way of understanding yourself, your company and your country. This project has been conducted to provide new insight in Norwegian Cyber security culture. Our goal is to develop effective cyber security practices and improve national cyber resilience. The results will also give indications on what security regulations the Norwegian people will see as acceptable and how to implement them.

Spotlight

BlueTalon | Unified Data Access Control

BlueTalon is a leading provider of Unified Data Access Control for big data and new data initiatives. The BlueTalon Policy Engine delivers precise, consistent, and dynamic user access controls to data across Hadoop, Spark, Cassandra, and traditional RDBMS. The BlueTalon Audit Engine provides a complete audit trail at the level of detail required for regulatory compliance and effective data security.

OTHER WHITEPAPERS
news image

Asana Security and Privacy

whitePaper | October 26, 2022

Customers trust Asana with their data so that they can focus on the work that matters most to their businesses. That’s why we’re focused not only on creating an easy to-use collaborative work management solution, but also on keeping our customers’ data safe.

Read More
news image

Fortinet Security Fabric Enables Digital Innovation

whitePaper | February 5, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

Read More
news image

Cybersecurity: A Comprehensive Risk Management Approach for Healthcare

whitePaper | August 19, 2022

Healthcare entities continue to face evolving cybersecurity threats that can put patient safety, privacy and operations at risk. Health information security breaches occur daily and will continue to accelerate as cyber-criminals recognize the value of patient data and the critical need for provider organizations to keep systems up and running. The cost of a data breach is astounding, and one few healthcare organizations can absorb as they continue to deal with the effects of the COVID-19 pandemic.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

Cloud Security Survey 2023: Infrastructure Protection Best Practices

whitePaper | September 23, 2022

This survey was distributed by VMware User Group (VMUG) to their user base between July and September 2022. The responses were analyzed by the phoenixNAP team and key findings are presented in this document.

Read More

Spotlight

BlueTalon | Unified Data Access Control

BlueTalon is a leading provider of Unified Data Access Control for big data and new data initiatives. The BlueTalon Policy Engine delivers precise, consistent, and dynamic user access controls to data across Hadoop, Spark, Cassandra, and traditional RDBMS. The BlueTalon Audit Engine provides a complete audit trail at the level of detail required for regulatory compliance and effective data security.

Events