Jakob Premrn

Cybersecurity Analyst

Jakob Premrn, CySA+, CCNP, Security+, RHCSA, is a cybersecurity analyst at NIL´s Security Operations Center (SOC). He mostly deals with security incidents. He is an expert for the SIEM, NDR, and EDR tools. He specializes in Microsoft technologies, but he also deals with developing and testing new technologies at SOC.

Content by this profile

The Importance of Identity-Oriented Cybersecurity

Why should you re-focus your cyber defense from on-premises security to identity-oriented security? Read the article and learn how to verify your remote users and...
Read more

Visit of a Security Operations Center (SOC)

SOC 101 In this podcast, we discussed about Cyber Security Operation Centers – so called SOCs. Jakob Premrn, a cyber security analyst at NIL (part...
Read more

Basic Principles of OT Security

The Challenge of Securing Windows 95-Based Devices Industrial environments with their Industrial Control Systems (ICSs) are a special challenge for IT security. They are rigid...
Read more

Industrial Cybersecurity and how to protect OT environments?

The basics of OT security Industrial environments are a special challenge for IT security. What we have noticed so far is that there are many...
Read more

How to be secure from Ransomware?

Ransomware 101 Jakob Premrn, cybersecurity expert at NIL, part of Conscia Group, explains what is Ransomware, why is it so profitable and how to defend...
Read more

How to Stop Ransomware?

Should you pay the ransom? The answer to a million dollar question Some of the most valuable companies today are those that collect, analyze, and...
Read more

Who Are Hackers and What Do They Want?

CyberSec Bites Podcast - Episode #1 Jakob Premrn, Cybersecurity analyst from NIL’s Security Operations Center (SOC) discusses the motives and operations of cybercriminals. What are they after?...
Read more

Cybersecurity Diagnostics: Machine versus Human

Nowadays, machines form an everyday part of our lives. They were invented to ease the daily tasks. Machines and robots can be seen working side-by-side...
Read more

(Un)Secure Microsoft Windows for Free

Protect your Microsoft environment using free built-in features Nowadays, programs and applications that are used contain more and more lines of code, which might contain...
Read more

The advantages of cloud-based SIEM and Azure Sentinel

SIEM that adapts to your IT-environment and the contemporary business-security demands The standard SIEM working systems need a powerful infrastructure. Therefore, configuring and maintaining a...
Read more