Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Optimize your digital experience with ThousandEyes
By mastering ThousandEyes, a cutting-edge network management platform, you will learn how to effectively diagnose…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
4 Cisco Instructor Excellence Awards for NIL Learning’s CCSIs
We are proud to announce that 4 NIL Learning’s instructors are among the recipients of…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Blogs
Home
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Tom Kern
Cyber Security Analyst
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Follina the Windows MSDT 0-day
2. Jun 2022
Microsoft confirmed a security vulnerability tracked as CVE-2022-30190 and released it on their MSRC portal on May 30th, 2022. The vulnerability allows for a remote code execution (RCE) when MSDT (Microsoft Support...
Read more
Stojan Rančić
IT Security Architect
Blog
Cybersecurity Is in the Hands of Managers
30. May 2022
We live in a world where not a day goes by without a new cybersecurity breach, data encryption,...
Read more
Blog
Solving the Collaboration Tools Interoperability Challenge with Webex Rooms
23. May 2022
Expanding the capabilities of the Webex Room system Conducting day-to-day business has become increasingly depend on the ability...
Read more
Katarina Primožič Ramoveš
People and culture officer
Blog
Sustainable Business Strategies: Responsibility and Opportunity of the HR
20. Mar 2022
One of the bigger COVID-19 consequences is definitely the change in business and management standards. The awareness that...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Visit of a Security Operations Center (SOC)
28. Feb 2022
SOC 101 In this podcast, we discussed about Cyber Security Operation Centers – so called SOCs. Jakob Premrn,...
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager
Blog
How to evaluate the credibility and quality of a SOC
24. Jan 2022
Choosing a Managed Detection and Response (MDR) service provider is very important, yet tricky task. Matevž Mesojednik, SOC Lead at...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
What to do and what not to do when you are under a cyber attack?
20. Oct 2021
Tackling cyber-attacks “ad-hoc” with no adequate knowledge of how to respond to an incident is never a good...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Understanding the Importance of First Steps After a Ransomware Attack
19. Oct 2021
What to do and what not to do when you are under a ransomware attack? Despite a lot...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Basic Principles of OT Security
13. Oct 2021
The Challenge of Securing Windows 95-Based Devices Industrial environments with their Industrial Control Systems (ICSs) are a special...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Industrial Cybersecurity and how to protect OT environments?
11. Oct 2021
The basics of OT security Industrial environments are a special challenge for IT security. What we have noticed...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
How to be secure from Ransomware?
6. Oct 2021
Ransomware 101 Jakob Premrn, cybersecurity expert at NIL, part of Conscia Group, explains what is Ransomware, why is...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
How to Stop Ransomware?
4. Oct 2021
Should you pay the ransom? The answer to a million dollar question Some of the most valuable companies...
Read more
Blog
How to fight against cyber attacks?
13. Aug 2021
Firefighting cyber attacks If you have been feeling depressed about the Covid-19 crisis lately, we’ve got the news...
Read more
Kent Heide
Technical Solutions Architect
Blog
Troubleshoot less, innovate more!
7. Jun 2021
How to get correlated, real-time visibility into application and network performance As a networking guy, I have already...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Who Are Hackers and What Do They Want?
21. Apr 2021
CyberSec Bites Podcast – Episode #1 Jakob Premrn, Cybersecurity analyst from NIL’s Security Operations Center (SOC) discusses the motives and...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Data Abundance
26. Mar 2021
Summary By using new technologies in our everyday lives, enormous amounts of data are produced. 59 Zettabytes of data...
Read more
Arjan Kievits
Wireless Technical Consultant at Conscia Netherlands
Blog
What is Wi-Fi 6E?
11. Feb 2021
It is like a famous children’s song ‘Twelve little monkeys jumping on the bed, one fell off and...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Cybersecurity Diagnostics: Machine versus Human
29. Jan 2021
Nowadays, machines form an everyday part of our lives. They were invented to ease the daily tasks. Machines...
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager
Blog
Firefighting Cyberattacks
19. Dec 2020
If you’ve been feeling depressed about the Covid-19 crisis lately, we’ve got news for you – cybercrime represents...
Read more
Stojan Rančić
IT Security Architect
Blog
With Cautious Optimism on the Road to Digital Immunity
7. Dec 2020
From the cyber-risk management perspective, the combination of the lack of staff, technical debt, and current COVID-19-related difficulties...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
(Un)Secure Microsoft Windows for Free
23. Nov 2020
Protect your Microsoft environment using free built-in features Nowadays, programs and applications that are used contain more and...
Read more
Tom Kern
Cyber Security Analyst
Blog
What Is a Threat Detection Framework?
19. Oct 2020
In today’s world of increasing complexity and lucrative cybercrime industry, you can only be certain of one thing:...
Read more
Blog
WannaTry again? SMBv3 Vulnerability Awakes!
11. Mar 2020
SMBv3 vulnerability (CVE-2020-0796) explained and how to defend against zero-day attacks While the world is struggling with real-life...
Read more
Blog
Microsoft Managed Security Services
13. Feb 2020
Overview of Microsoft`s cyber security solutions and services Envisioning workshop for Managed Security as a Service that empowers...
Read more
Blog
SOC Orchestra: The symphony of security tools
31. Jan 2020
Efficiency in SOC: automation and orchestration Digitization is increasing the need to manage cyber risks. Because organizations find...
Read more
Jan Bervar
IT Architect
Blog
Lowering the aggregation link costs while improving service quality
22. Feb 2019
Automated decongestion of critical network links A major international service provider was facing service quality issues due to...
Read more
Jan Bervar
IT Architect
Blog
Dude, where’s my (cloud) firewall?
30. Mar 2017
I have always claimed that the tech side of cloud security is not about the trust you have...
Read more
Blog
Collaboration with this kind of engineer is easy. even at 3am.
2. Nov 2016
Collaboration with this kind of engineer is easy. even at 3am. A short while ago we were upgrading...
Read more
Mitja Robas
Service Delivery Manager
Blog
Breaking Myths: SDN and NFV
30. Jul 2015
For a long time now the network has been the foundation of digital business operations, transmitting all sorts...
Read more
Dejan Miletić
Director, International Sales
Blog
Mobility is here. Are you on board?
15. Jun 2015
Nowadays people don’t want to be constrained by the place and time of their work. We are not...
Read more
«
1
2