Menu
Solutions
Back
Solutions
AI, Data Center, and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
Cybersecurity
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (MDR) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
SOC (Security Operations Center) Building Services
Read more
Zero Trust Architecture
Read more
Digital workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
Professional Services
Read more
NIS-2 Overview and Recommendations
Read more
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Managed Services
Read more
Managed Microsoft Defender
Read more
Managed Cloud Disaster Recovery
Read more
Managed Cloud Data Center
Read more
NIL Advanced Service Intelligence
Read more
Managed Data Center Infrastructure
Read more
NIL Microsoft Support
Read more
Managed Secure Backup
Read more
Managed Server Operating Systems
Read more
Managed Firewall
Read more
Managed WAF and Load Balancer
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
NIS 2: Understanding what matters now
NIS 2 is reshaping how organisations approach digital resilience. In this webinar, we looked at…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
ISO/IEC 27001:2022 Certification as a confirmation of our commitment to information security
The ISO/IEC 27001:2022 standard remains the leading global framework for establishing, operating, and continuously improving…
Read more
Search for:
Search for:
Search
Select your local Conscia office:
Go to
Global
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
NIL Learning
NIL Learning
Contact
Blogs
Home
»
Cybersecurity
»
Page 4
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Malware Persistency (part 1)
26. Aug 2022
Malware persistency is a mechanism adversaries use to ensure foothold in a breached environment. Read the article to learn how to detect it.
Read more
News
NIL Recognized by Palo Alto Networks as a NextWave Diamond Innovator
24. Aug 2022
NIL joins a selected group of Palo Alto Networks channel partners which have met the NextWave Diamond Innovator...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Diving Deep: Malware Injection Techniques
27. Jul 2022
Malware Injection Techniques This is the first entry in the Malware Injection Techniques article series that we will be writing...
Read more
Whitepaper
Realize SASE your way with Cisco
YOUR JOURNEY TO SASE The demand for anywhere, anytime access has grown as the workforce has become more...
Read more
Page
Incident Response
Under cyber-attack? If your organization is experiencing a digital attack or highly suspicious activity in your environment, contact...
Read more
Page
SASE – Secure Access Service Edge
Combining powerful technologies with NIL SASE Enterprise networks are changing and becoming more complex with the ever-increasing number of...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Whitepaper
Dissecting Russian State-sponsored Threat Actors
Who are the Russian-state sponsored hackers that fight in cyber-war in Ukraine, what techniques are they using and...
Read more
Page
Secure SD-WAN as a Service
Fast, secure and affordable With our Secure Managed SD-WAN service, we can help you deploy SD-WAN without using...
Read more
Case
Conscia’s expertise enhances BDO’s security work
With Conscia Cyber Defense, the auditing firm BDO has gained access to the right security expertise - and...
Read more
Tom Kern
Cyber Security Analyst
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Follina the Windows MSDT 0-day
2. Jun 2022
Microsoft confirmed a security vulnerability tracked as CVE-2022-30190 and released it on their MSRC portal on May 30th, 2022. The...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Whitepaper
What you need to know about the increased Digital Risks following the cyber-attacks on Ukraine
Amidst the ongoing warfare, we were able to track the development of new dedicated and tailored malware (HermeticWiper...
Read more
Stojan Rančić
IT Security Architect
Blog
Cybersecurity Is in the Hands of Managers
30. May 2022
We live in a world where not a day goes by without a new cybersecurity breach, data encryption,...
Read more
Johan Camps
Video
Securely to the clouds and beyond: Secure SD-WAN as a Service
Secure access anywhere Many related factors and processes compete for attention when migrating to the cloud or establishing...
Read more
Martin Holm
Senior Network Engineer, Conscia Sweden
Whitepaper
SD-WAN and SASE – The journey to a more secure network
Today, as an IT professional, you must be able to offer a high-performance, scalable and secure network to...
Read more
Video
Cyberwarfare and its Impact on Your Business
Destructive malware’s capabilities against your organization Cybersecurity analysts have already identified malware that was specifically developed to attack...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Visit of a Security Operations Center (SOC)
28. Feb 2022
SOC 101 In this podcast, we discussed about Cyber Security Operation Centers – so called SOCs. Jakob Premrn,...
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager
Blog
How to evaluate the credibility and quality of a SOC
24. Jan 2022
Choosing a Managed Detection and Response (MDR) service provider is very important, yet tricky task. Matevž Mesojednik, SOC Lead at...
Read more
Case
Network Gatekeeper in the Cloud
The need for secure remote connections is greater than ever. For a company like Sinch with operations in...
Read more
Video
Log4j – one week in
Log4j vulnerability – what you need to know now and how to be better prepared for the similar...
Read more
Case
Schiphol Telematics Opts for Fundamental Outsourcing
Schipol Telematics decided to outsource services to third parties with better technological know-how and experience. For the network...
Read more
Case
The UMC Utrecht chooses Conscia Managed Security Services
Conscia provides monitoring and the hybrid management service from its own Network Operations Center (NOC) and Security Operations...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
What to do and what not to do when you are under a cyber attack?
20. Oct 2021
Tackling cyber-attacks “ad-hoc” with no adequate knowledge of how to respond to an incident is never a good...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Understanding the Importance of First Steps After a Ransomware Attack
19. Oct 2021
What to do and what not to do when you are under a ransomware attack? Despite a lot...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Basic Principles of OT Security
13. Oct 2021
The Challenge of Securing Windows 95-Based Devices Industrial environments with their Industrial Control Systems (ICSs) are a special...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Industrial Cybersecurity and how to protect OT environments?
11. Oct 2021
The basics of OT security Industrial environments are a special challenge for IT security. What we have noticed...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
How to be secure from Ransomware?
6. Oct 2021
Ransomware 101 Jakob Premrn, cybersecurity expert at NIL, part of Conscia Group, explains what is Ransomware, why is...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
How to Stop Ransomware?
4. Oct 2021
Should you pay the ransom? The answer to a million dollar question Some of the most valuable companies...
Read more
Case
Reliable energy in time of evolving cyber threats
Conscia SOC helps keep your family warm during wintertime Centrica Energy Trading A/S, a leading gas, power and...
Read more
Page
Zero Trust Architecture
Security architecture for dynamic and decentralized IT-environments Modern digitalized businesses embraced decentralization as the de facto mode of...
Read more
Page
SOC (Security Operations Center) Building Services
Effective, automated, and economical Many large organizations have learned the hard way that efficient detection and response to...
Read more
1
2
3
…
5
»