Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
NIS-2 Overview and Recommendations
Read more
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Unleash the Power of AI and Automation with Cisco Hypershield
Hypershield combines unmatched integration, AI-driven insights, and cutting-edge automation to deliver faster threat detection, seamless…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
NIL Achieves Microsoft Solutions Partner Designation for Private Cloud
This recognition highlights our expertise in delivering innovative and secure private cloud solutions, demonstrating our…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Blogs
Home
»
Security Operations
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Suzana Kužnik
Security Operations Center Analyst
Blog
What to do and what not to do when you are under a cyber attack?
20. Oct 2021
Tackling cyber-attacks “ad-hoc” with no adequate knowledge of how to respond to an incident is never a good reaction. So what should you do when you are under a cyber...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Understanding the Importance of First Steps After a Ransomware Attack
19. Oct 2021
What to do and what not to do when you are under a ransomware attack? Despite a lot...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Basic Principles of OT Security
13. Oct 2021
The Challenge of Securing Windows 95-Based Devices Industrial environments with their Industrial Control Systems (ICSs) are a special...
Read more
Case
Reliable energy in time of evolving cyber threats
Conscia SOC helps keep your family warm during wintertime Centrica Energy Trading A/S, a leading gas, power and...
Read more
Whitepaper
What is AIOps?
Today, it is impossible for the human brain to have an overview of all systems interconnected in our...
Read more
Page
Security Operations Center (SOC) Building Services
Effective, automated, and economical threat detection and response Many large organizations have learned the hard way that efficient...
Read more
Page
Secure Mobility
Get the job done anywhere, anytime, with minimal risk Mobile working, be it from company or personal devices,...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Data Abundance
26. Mar 2021
Summary By using new technologies in our everyday lives, enormous amounts of data are produced. 59 Zettabytes of data...
Read more
Page
IT Security
Harden the defenses of your IT environment We believe that it is not the evolution of threats that...
Read more
Arjan Kievits
Wireless Technical Consultant at Conscia Netherlands
Video
Wi-Fi 6E: Velik korak naprej v Wi-Fi komunikaciji
Kaj je Wi-Fi 6E in kaj omogoča? Kaj je Wi-Fi 6E in kako je povezan z drugimi frekvencami?...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Cybersecurity Diagnostics: Machine versus Human
29. Jan 2021
Nowadays, machines form an everyday part of our lives. They were invented to ease the daily tasks. Machines...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
(Un)Secure Microsoft Windows for Free
23. Nov 2020
Protect your Microsoft environment using free built-in features Nowadays, programs and applications that are used contain more and...
Read more
Tom Kern
Cyber Security Analyst
Blog
What Is a Threat Detection Framework?
19. Oct 2020
In today’s world of increasing complexity and lucrative cybercrime industry, you can only be certain of one thing:...
Read more
Whitepaper
White Paper: Secure Email Means Secure Business
This white paper describes threats concerning email, the monitoring and protection functionality necessary to neutralize those threats, and...
Read more
Case
Banks That Take Cybersecurity Seriously Use a SOC
NIL SOC is the one for Delavska hranilnica Delavska hranilnica savings bank is pursuing a strategic approach to...
Read more
Jan Bervar
Security Architect
Video
Is your cyber defense strategy a waste of money?
Numbers don’t lie. In spite of all the investment and technological upgrades over the years, hackers remain a...
Read more
Video
Securing diverse IT environments with Cisco Tetration
How to protect your hybrid workloads? Modern business is inherently dynamic. Change is the new imperative and that...
Read more
Whitepaper
Stopping cybercrime from stopping business
Every year, cybercriminals are forcing organisations around the world to realize the limits of prevention technology. Today, a...
Read more
Blog
WannaTry again? SMBv3 Vulnerability Awakes!
11. Mar 2020
SMBv3 vulnerability (CVE-2020-0796) explained and how to defend against zero-day attacks While the world is struggling with real-life...
Read more
Stojan Rančić
IT Security Architect
Video
Zero Trust eXtended framework (and how to establish it with Cisco’s solutions)
How to achieve perimeterless security without harming productivity? In today’s business, your workforce, workloads, and workplace are literally...
Read more
Video
SOC Orchestra: The symphony of security tools
Efficiency in SOC: automation and orchestration Digitization is increasing the need to manage cyber risks. Because organizations find...
Read more
Video
Application performance and business optimization with Cisco AppDynamics
Real-Time Application Performance Monitoring with Cisco AppDynamics Cisco AppDynamics is a leading Application Performance Management (APM) solution that...
Read more
Video
Rise of Mobile Threats and MTD
How to protect your users against modern mobile threats? In this lecture Leszek Twardowski, Sr. System Engineer, MobileIron,...
Read more
Video
Introducing a Mobile-centric Approach to Zero Trust
Zero Trust in Mobile Environments In the video, Claus Nussbaum – Sales Director Austria & Eastern Europe, MobileIron...
Read more
Stojan Rančić
IT Security Architect
Video
Cisco Zero Trust Architecture
Cisco Zero Trust Architecture Overview The Zero Trust Architecture (ZTA) represents a modern IT environment design that is...
Read more
Jan Bervar
Security Architect
Video
You better make good on your (security) debt
“Technical debt” describes the consequences of all the bad choices and shortcuts we have taken in IT over...
Read more
Case
Simplified data center firewall policies for maximum security
Safety first with Internet of Things technologies at the OCP Group NIL helped the OCP Group, a leading...
Read more
Jan Bervar
Security Architect
Blog
Lowering the aggregation link costs while improving service quality
22. Feb 2019
Automated decongestion of critical network links A major international service provider was facing service quality issues due to...
Read more
Case
Suzuki Garphyttan
Suzuki Garphyttan, a part of the Nippon Steel Group, is adopting their strategy for “Smart Industry 4.0” towards...
Read more
Jan Bervar
Security Architect
Video
Smart security investing: change your game!
Change your game! As the infosec – pardon me, the “cybersec” – vendor community is trying to hide...
Read more
«
1
2
3
4
»