elfGROUP has partnered up already for the third time with the Cyber Security Executive event. The CSE has been an important event for us to meet and catch up with our customers and partner companies. For three years in a row we have upgraded our presence and visibility at the event.
FCG Talent is a Finnish company that develops modern, innovative and user-friendly software solutions for recruitment, HR data management and personnel introduction and development. Their best-known product is the Kuntarekry.fi service, a recruitment portal used by nearly every municipality in [...]
SAMM (Software Assurance Maturity Model) is a model for assessing the maturity of security related activities in software construction and verification as well as other software engineering domains. It is developed by the Open Web Application Security Project OWASP community; hence the model is [...]
elfGROUP’s all operations have been certified according to the internationally recognised information security management system standard ISO 27001. Bureau Veritas has audited our operations and granted us the certification on July 3rd, 2019. We announced our ISO 9001 news this April, and now [...]
IoT, Internet of Things, machine to machine or industrial internet – this buzzword has many synonyms. It is a topical concept both in homes and in industrial settings, as systems are connected in ever larger and smarter entities.
A member of the European Parliament, Mirja Vehkapeä visited the elfGROUP headquarters Thursday May 2nd, 2019, as part of her campaign tour. Mrs. Vehkaperä was visiting Oulu-based growth companies, getting to know their operations and expertise, as well as discussing how the companies have [...]
elfGROUP’s operations have been certified according to the internationally recognised quality management system ISO 9001:2015. Bureau Veritas has audited our operations and granted us the ISO 9001 certification on April 12th, 2019.
All organizations are responsible for the cyber security of their information systems and software. There are risks you will want to mitigate rather than accept – would you want to just wait for these threats to actualize? Read from the graphic below, why you would want to invest in hacker [...]
All organizations handling electronic information and utilizing information technology must take care of their information systems’ data security. Independent of whether the motives are based on the willingness to ensure uninterrupted business continuity, meet regulatory compliance or to [...]