Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Cisco Cyber Vision in Action: How to Secure Your OT Network
Learn how you can use Cisco Cyber Vision to improve the security of your OT…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
NIL achieves the Cisco Secure Access Service Edge Solution Specialization
We are proud to announce that NIL has achieved the prestigious Cisco Secure Access Service…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Events
Home
»
Cybersecurity
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Show Filters
Industries
All
Construction
Energy / Utilities
Healthcare / Life Science
Local Government / Municipalities
Manufacturing
Retail
Sports / Entertainment
Transportation
Solutions & Services
Automation
Cloud
Collaboration
Conscia Services
Cybersecurity
Datacenter
Networking
Business outcome
Digital Transformation
ESG: Environment
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
Zlatko Marić
Consulting Engineer
Benjamin Kic
Systems Engineer
Event
What`s New in Cisco Network Security: Strategy & Latest Solutions
16. May 2023
Delve into Cisco's network security roadmap and learn about new developments in traffic encryption, dynamic security rules and the innovative 3k FTD Secure series in our upcoming webinar!
Read more
Caroline Dristig
Information Security Consultant, Conscia Sweden
Kajsa Rosnes Bogen
Cyber Security Consultant, Conscia Norway
Video
How you prepare for the NIS2 directive
Join us in this webinar to discover the potential impact of NIS2 directive on your organization and learn...
Read more
Martin Holm
Senior Network Engineer, Conscia Sweden
Max Geiger
Security Consultant, Conscia Sweden
Event
Is Your Firewall Good Enough? Secure it with AIOps and TISP
26. Apr 2023
Do you want a quick, affordable, and automated check of your firewall rules? Join our webinar and learn...
Read more
Case
Cisco Umbrella is like a light in the dark
The Løvenskiold-Vækerø Group was able to quickly reduce cyber risks with Cisco Umbrella. They are also planning to...
Read more
Caroline Dristig
Information Security Consultant, Conscia Sweden
Kajsa Rosnes Bogen
Cyber Security Consultant, Conscia Norway
Event
How you prepare for the NIS2 directive
20. Apr 2023
Join us in this webinar to discover the potential impact of NIS2 directive on your organization and learn...
Read more
Whitepaper
NIS2 – A comprehensive overview of NIS2 Directive
This whitepaper provides information on the NIS2 directive, including its primary goals, scope, and the requirements imposed on...
Read more
Jure Planinšek
Head of Compliance and Legal
Blog
Diligent Management and Cybersecurity
17. Feb 2023
Leadership should be familiar with and understand cyber risks and their management, even though they may not have...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How could AI simplify malware attacks, and why is this worrying?
26. Jan 2023
AI can simplify malware attacks, lowering costs, giving cybercriminals an advantage over insufficiently secured targets.
Read more
Video
The Future of AI and Quantum
How AI and Quantum technologies impact our companies and what opportunities and challenges do they bring to our...
Read more
Case
Municipality of Emmen Further Extends Their Online Services
The Municipality of Emmen has implemented the F5 BIG-IP suite, assisted by Conscia. The municipality uses various modules...
Read more
Benjamin Kic
Systems Engineer
Video
Secure Remote Work with Cisco Umbrella
Learn how Cisco Umbrella reduces cyber risks for your distributed workforce and helps you easily establish a consistent...
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager
Blog
Three Lessons for Better Cybersecurity in 2023
20. Dec 2022
From the point of view of Conscia's Security Operations Center (SOC), 2022 confirmed the fact that managing cyber...
Read more
Benjamin Kic
Systems Engineer
Event
Secure Remote Work with Cisco Umbrella
18. Jan 2023
Cisco Umbrella protects your users everywhere. Join the webinar and learn how it reduces cyber risks for your...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin
12. Dec 2022
Criminals don't like to leave traces. In the cyber world, that means deleting their malicious software from your...
Read more
Video
Ensure a flawless digital experience and business impact with Cisco FSO
In the Ensure a flawless digital experience and business impact with Cisco FSO webinar, we highlighted key use...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Season’s Greetings from Cybercriminals
25. Nov 2022
Cybercrime is on the rise during the holiday season. Cybercriminals take advantage of Black Friday, Cyber Monday, and...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Phishing as a Service (PHaaS) – an Effective Attack Vector for All Threat Actors
25. Nov 2022
Phishing has professionalized. It is literally available to criminals in a »as a service« model, and the most...
Read more
Event
Ensure a flawless digital experience and business impact with Cisco FSO
6. Dec 2022
In this live webinar, we will highlight some of the key use cases for Cisco Full-Stack Observability and...
Read more
Dušan Vaupotič
IT Manager
Blog
Remote Desktop Applications` Security
13. Nov 2022
Remote Desktop Applications (RDA) usage is growing and with that the importance of keeping them secure. Learn about...
Read more
Case
Sandefjord Municipality: An IT Pioneer Among Norwegian Municipalities
Conscia helped Sandefjord Municipality implement a Cisco ACI network, and Cisco Hyperflex data center with Software Defined Access...
Read more
News
NIL Partners with Delinea to Offer Leading Privileged Access Management Solutions
27. Oct 2022
NIL will offer and support Delinea’s Secret Server (Privileged Access Management) and Privilege Manager (Privilege elevation and application...
Read more
Blog
Security of Remote Desktop Applications
21. Oct 2022
Remote work is great for many reasons. But for hackers, it is another opportunity for attack. How to...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
The Importance of Identity-Oriented Cybersecurity
21. Oct 2022
Why should you re-focus your cyber defense from on-premises security to identity-oriented security? Listen the podcast and learn...
Read more
Ewan Hubac
Cybersecurity Product Manager, Conscia Group
Video
Cyber Threat Intelligence: A Better Way to Do Vulnerability Management
Why is vulnerability management hard and how can you improve it? Watch the recording and learn about better...
Read more
Case
Integrated NOC and SOC services at Franciscus Gasthuis & Vlietland
Franciscus Gasthuis & Vlietland integrates IT and security infrastructure using Conscia NOC and SOC services.
Read more
News
NIL Achieves the Cisco Powered Validated Service for Secure Access Service Edge (SASE) Status
30. Sep 2022
This Cisco Powered service status demonstrates NIL’s expertise and capacity for delivering the Cisco Secure Access Services Edge...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
New 0-day vulnerabilities in Microsoft Exchange Server actively exploited
30. Sep 2022
Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082...
Read more
News
NIL achieves two Microsoft Advanced Security Specializations
26. Sep 2022
NIL has met the requirements for Microsoft Advanced Specialization – Threat Protection and Microsoft Advanced Specialization – Access...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Insider Threats: What are they and how to mitigate them
20. Sep 2022
Organizations' own personnel pose one of the biggest threats to their security. Read the article to learn how...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
The Importance of Identity-Oriented Cybersecurity
14. Sep 2022
Why should you re-focus your cyber defense from on-premises security to identity-oriented security? Read the article and learn...
Read more
«
1
2
3
4
»