Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
NIS-2 Overview and Recommendations
Read more
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Unleash the Power of AI and Automation with Cisco Hypershield
Hypershield combines unmatched integration, AI-driven insights, and cutting-edge automation to deliver faster threat detection, seamless…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
NIL Achieves Microsoft Solutions Partner Designation for Private Cloud
This recognition highlights our expertise in delivering innovative and secure private cloud solutions, demonstrating our…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Events
Home
»
All
»
Page 2
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Show Filters
Industries
All
Construction
Energy / Utilities
Healthcare / Life Science
Local Government / Municipalities
Manufacturing
Retail
Sports / Entertainment
Transportation
Solutions & Services
Automation
Cloud
Collaboration
Conscia Services
Cybersecurity
Datacenter
Education
Learning & Content Development
Networking
Business outcome
Digital Transformation
ESG: Environment
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
Event
Ensure a flawless digital experience and business impact with Cisco FSO
6. Dec 2022
In this live webinar, we will highlight some of the key use cases for Cisco Full-Stack Observability and discuss future developments.
Read more
Dušan Vaupotič
IT Manager
Blog
Remote Desktop Applications` Security
13. Nov 2022
Remote Desktop Applications (RDA) usage is growing and with that the importance of keeping them secure. Learn about...
Read more
News
NIL Partners with Delinea to Offer Leading Privileged Access Management Solutions
27. Oct 2022
NIL will offer and support Delinea’s Secret Server (Privileged Access Management) and Privilege Manager (Privilege elevation and application...
Read more
Blog
Security of Remote Desktop Applications
21. Oct 2022
Remote work is great for many reasons. But for hackers, it is another opportunity for attack. How to...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
The Importance of Identity-Oriented Cybersecurity
21. Oct 2022
Why should you re-focus your cyber defense from on-premises security to identity-oriented security? Listen the podcast and learn...
Read more
Ewan Hubac
Cybersecurity Product Manager, Conscia Group
Video
Cyber Threat Intelligence: A Better Way to Do Vulnerability Management
Why is vulnerability management hard and how can you improve it? Watch the recording and learn about better...
Read more
Page
Cisco ThousandEyes
Internet and Cloud visibility for seamless user experience Cloud applications and hybrid work are dominating the enterprise. The...
Read more
Pascal Huijbers
CTO, Conscia Group
Video
Impact of emerging technologies on the companies of the future
Pascal Huijbers, CTO at Conscia Grupu on the impact of emerging technologies on the companies of the future.
Read more
News
NIL Achieves the Cisco Powered Validated Service for Secure Access Service Edge (SASE) Status
30. Sep 2022
This Cisco Powered service status demonstrates NIL’s expertise and capacity for delivering the Cisco Secure Access Services Edge...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
New 0-day vulnerabilities in Microsoft Exchange Server actively exploited
30. Sep 2022
Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082...
Read more
News
NIL achieves two Microsoft Advanced Security Specializations
26. Sep 2022
NIL has met the requirements for Microsoft Advanced Specialization – Threat Protection and Microsoft Advanced Specialization – Access...
Read more
Kent Heide
Technical Solutions Architect
Video
Is the Internet your blind spot?
Learn how you can use ThousandEyes to troubleshoot problems with SaaS services and Microsoft 365 applications.
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Insider Threats: What are they and how to mitigate them
20. Sep 2022
Organizations' own personnel pose one of the biggest threats to their security. Read the article to learn how...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
The Importance of Identity-Oriented Cybersecurity
14. Sep 2022
Why should you re-focus your cyber defense from on-premises security to identity-oriented security? Read the article and learn...
Read more
Ewan Hubac
Cybersecurity Product Manager, Conscia Group
Event
Cyber Threat Intelligence: A Better Way to Do Vulnerability Management
13. Oct 2022
Why is vulnerability management hard and how can you improve it? Join the webinar and learn about better...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Malware Persistency (part 1)
26. Aug 2022
Malware persistency is a mechanism adversaries use to ensure foothold in a breached environment. Read the article to...
Read more
News
NIL Recognized by Palo Alto Networks as a NextWave Diamond Innovator
24. Aug 2022
NIL joins a selected group of Palo Alto Networks channel partners which have met the NextWave Diamond Innovator...
Read more
Kent Heide
Technical Solutions Architect
Event
Microsoft 365 services monitoring with ThousandEyes
20. Sep 2022
Join the free webinar and learn how you can use ThousandEyes to troubleshoot problems with SaaS services and...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Diving Deep: Malware Injection Techniques
27. Jul 2022
Malware Injection Techniques This is the first entry in the Malware Injection Techniques article series that we will be writing...
Read more
News
NIL Is the First in Slovenia to Achieve Cisco’s Environmental Sustainability Specialization
8. Jul 2022
The Cisco Environmental Sustainability Specialization title confirms NIL’s commitment to sustainable business and social responsibility. NIL is the...
Read more
Whitepaper
Realize SASE your way with Cisco
YOUR JOURNEY TO SASE The demand for anywhere, anytime access has grown as the workforce has become more...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Whitepaper
Dissecting Russian State-sponsored Threat Actors
Who are the Russian-state sponsored hackers that fight in cyber-war in Ukraine, what techniques are they using and...
Read more
Blog
SASE – Buzzword or an intelligent road to cloud security?
28. Jun 2022
Secure Access Service Edge (SASE) All about what SASE (Secure Access Service Edge) is and how it can...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Typosquatting?
27. Jun 2022
Typosquatting is a type of social engineering attack, where a threat actor registers domains with deliberately misspelled names...
Read more
Stojan Rančić
IT Security Architect
Video
Cloud Data, Cloud Apps, Cloud Networking .. what about Cloud Security?
Cloud security with Cisco Secure Access Service Edge (SASE) Watch the lecture by Stojan Rančić from NIL and...
Read more
Tom Kern
Cyber Security Analyst
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Follina the Windows MSDT 0-day
2. Jun 2022
Microsoft confirmed a security vulnerability tracked as CVE-2022-30190 and released it on their MSRC portal on May 30th, 2022. The...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Whitepaper
What you need to know about the increased Digital Risks following the cyber-attacks on Ukraine
Amidst the ongoing warfare, we were able to track the development of new dedicated and tailored malware (HermeticWiper...
Read more
Stojan Rančić
IT Security Architect
Blog
Cybersecurity Is in the Hands of Managers
30. May 2022
We live in a world where not a day goes by without a new cybersecurity breach, data encryption,...
Read more
Arjan Kievits
Wireless Technical Consultant at Conscia Netherlands
Video
Wi-Fi Trends: Wi-Fi 6E, Wi-Fi 7, WPA3 & More
Development and trends in enterprise wireless networking For users, Wi-Fi is ubiquitous and binary: it either works or...
Read more
Joacim Wicander
Video
Central management of your multi-cloud with Intersight, Kubernetes and Terraform
Central management of your multi-cloud With Intersight, you can now get an interface for managing, for example, AWS,...
Read more
«
1
2
3
4
5
6
7
»