Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
NIS-2 Overview and Recommendations
Read more
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Unleash the Power of AI and Automation with Cisco Hypershield
Hypershield combines unmatched integration, AI-driven insights, and cutting-edge automation to deliver faster threat detection, seamless…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
NIL Achieves Microsoft Solutions Partner Designation for Private Cloud
This recognition highlights our expertise in delivering innovative and secure private cloud solutions, demonstrating our…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Blogs
Home
»
Cybersecurity
»
Page 2
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
David Kasabji
Principal Threat Intelligence Engineer
Blog
The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes
11. Jan 2024
In the evolving landscape of cybersecurity threats, GitHub, a popular collaborative coding and version control platform, has emerged as a new frontier for cybercriminals and advanced persistent threats (APTs). This...
Read more
Erik Hren
Cybersecurity analyst
Jernej Galjanič
Cybersecurity analyst
Blog
Interview: Artificial intelligence in cybersecurity: who will make better use of it?
11. Jan 2024
AI helps both hackers and those who fight them – but in addition to sophisticated security solutions, it...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity
22. Dec 2023
In the dynamic world of cybersecurity, understanding the implications of receiving an unprompted one-time passcode (OTP) is crucial. This occurrence...
Read more
Video
Cybersecurity in the AI Era
Explore the impact of Artificial Intelligence (AI) on cyber security in this webinar recording. Discover AI-driven cyber threats...
Read more
Event
Cybersecurity in the AI Era
14. Dec 2023
Explore the impact of Artificial Intelligence (AI) on cyber security in our webinar on 14 December 2023. Discover...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How Cybercriminals Exploit Legitimate Internet Services for Malicious Purposes
2. Nov 2023
Cybercriminals increasingly manipulate reputable platforms such as Google Drive, OneDrive, Notion, and GitHub to camouflage their malicious activities...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
New Critical Vulnerability in Cisco IOS XE Software Poses Cybersecurity Concerns
18. Oct 2023
CVE-2023-20198 vulnerability affects physical and virtual devices running Cisco IOS XE software with the HTTP or HTTPS Server...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data
11. Oct 2023
Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and validate payment card numbers. These...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Adversary-In-The-Middle Attack (AiTM): A novel way to evade MFA
5. Oct 2023
In the vast realm of cyber threats, a relatively newer but impactful method has emerged: Adversary In the...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Understanding Vulnerability Lifecycle to Better Combat Exploits
21. Sep 2023
If you care about cybersecurity, you surely have heard the term ‘software vulnerability.’ But it can quickly happen...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
CL0P Group – Analysis of European’s rising ransomware threat
21. Sep 2023
If you were following trends in the cyber threat landscape for the past few months, or actually the...
Read more
Niels Mogensen
Security Evangelist
Whitepaper
OT Security Best Practices: Let OT and IT play together safely
IT is crucial for a company’s operations and the ability to gain insights intoLearn about OT Security Best...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
A look into Living off the Land adversarial technique
1. Sep 2023
Recently, you may have noticed several cybersecurity news sites citing Microsoft’s article on Flax Typhoon’s (threat actors) stealthiness while performing...
Read more
Uroš Šuštar
Consulting Engineer
Video
Securing a Hybrid Workforce with Palo Alto Networks Prisma Access
Learn how Palo Alto Networks Prisma Access, the industry’s most secure SASE solution, helps you protect your users,...
Read more
Page
Cybersecurity Maturity Assessment
How mature is your organization’s security posture? As your digital footprint increases, so does your cyber/attack surface. A...
Read more
Uroš Šuštar
Consulting Engineer
Event
Securing a Hybrid Workforce with Palo Alto Networks Prisma Access
20. Jun 2023
Learn how Palo Alto Prisma Access, the industry’s most secure SASE solution, helps you protect your users, devices,...
Read more
Zlatko Marić
Consulting Engineer
Benjamin Kic
Systems Engineer
Video
What’s New in Cisco Network Security: Strategy & Latest Solutions
Delve into Cisco's network security roadmap and learn about new developments in traffic encryption, dynamic security rules and...
Read more
Martin Holm
Senior Network Engineer, Conscia Sweden
Max Geiger
Security Consultant, Conscia Sweden
Video
Is Your Firewall Good Enough? Secure it with AIOps and TISP
Do you want a quick, affordable, and automated check of your firewall rules? Watch the webinar recording and...
Read more
Zlatko Marić
Consulting Engineer
Benjamin Kic
Systems Engineer
Event
What`s New in Cisco Network Security: Strategy & Latest Solutions
16. May 2023
Delve into Cisco's network security roadmap and learn about new developments in traffic encryption, dynamic security rules and...
Read more
Caroline Dristig
Information Security Consultant, Conscia Sweden
Kajsa Rosnes Bogen
Cyber Security Consultant, Conscia Norway
Video
How you prepare for the NIS2 directive
Join us in this webinar to discover the potential impact of NIS2 directive on your organization and learn...
Read more
Martin Holm
Senior Network Engineer, Conscia Sweden
Max Geiger
Security Consultant, Conscia Sweden
Event
Is Your Firewall Good Enough? Secure it with AIOps and TISP
26. Apr 2023
Do you want a quick, affordable, and automated check of your firewall rules? Join our webinar and learn...
Read more
Case
Cisco Umbrella is like a light in the dark
The Løvenskiold-Vækerø Group was able to quickly reduce cyber risks with Cisco Umbrella. They are also planning to...
Read more
Caroline Dristig
Information Security Consultant, Conscia Sweden
Kajsa Rosnes Bogen
Cyber Security Consultant, Conscia Norway
Event
How you prepare for the NIS2 directive
20. Apr 2023
Join us in this webinar to discover the potential impact of NIS2 directive on your organization and learn...
Read more
Whitepaper
NIS2 – A comprehensive overview of NIS2 Directive
This whitepaper provides information on the NIS2 directive, including its primary goals, scope, and the requirements imposed on...
Read more
Jure Planinšek
Head of Compliance and Legal
Blog
Diligent Management and Cybersecurity
17. Feb 2023
Leadership should be familiar with and understand cyber risks and their management, even though they may not have...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How could AI simplify malware attacks, and why is this worrying?
26. Jan 2023
AI can simplify malware attacks, lowering costs, giving cybercriminals an advantage over insufficiently secured targets.
Read more
Video
The Future of AI and Quantum
How AI and Quantum technologies impact our companies and what opportunities and challenges do they bring to our...
Read more
Case
Municipality of Emmen Further Extends Their Online Services
The Municipality of Emmen has implemented the F5 BIG-IP suite, assisted by Conscia. The municipality uses various modules...
Read more
Benjamin Kic
Systems Engineer
Video
Secure Remote Work with Cisco Umbrella
Learn how Cisco Umbrella reduces cyber risks for your distributed workforce and helps you easily establish a consistent...
Read more
Page
NIL Vault
Last line of data defense against cyber criminals Cyber attacks, ransomware, and hacking are all highly successful and...
Read more
1
2
3
…
5
»