Menu
Solutions
Back
Solutions
AI, Data Center, and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
Cybersecurity
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (MDR) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
SOC (Security Operations Center) Building Services
Read more
Zero Trust Architecture
Read more
Digital workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
Professional Services
Read more
NIS-2 Overview and Recommendations
Read more
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Managed Services
Read more
Managed Microsoft Defender
Read more
Managed Cloud Disaster Recovery
Read more
Managed Cloud Data Center
Read more
NIL Advanced Service Intelligence
Read more
Managed Data Center Infrastructure
Read more
NIL Microsoft Support
Read more
Managed Secure Backup
Read more
Managed Server Operating Systems
Read more
Managed Firewall
Read more
Managed WAF and Load Balancer
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Browser Security: A less covered Attack Vector – but a potent toolbox for the defender
You’ll learn how attackers exploit browser behaviour, what a managed secure browser offers, and how…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
From Cisco Gold Partner to Cisco Preferred Partner
Under the Cisco 360 Partner Program, NIL is recognised as a Cisco Preferred Partner across…
Read more
Search for:
Search for:
Search
Select your local Conscia office:
Go to
Global
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
NIL Learning
NIL Learning
Contact
Blogs
Home
»
Security Operations Center (SOC)
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Matevž Mesojednik
Security Operations Center (SOC) Manager
Blog
The Core of (Cyber)security? Human Intelligence.
3. Feb 2026
In cybersecurity, technology is crucial, but people make the real difference. How do you build a culture of trust, learning, and responsibility within your team? Technology is the foundation, but...
Read more
Blog
DFVU Data Breach: A Comprehensive Analysis and Preventive Strategies
29. Jan 2024
In a significant cybersecurity incident, Slovenian retailer DFVU, which operates brands such as S-mania, Layoners, Mazzaci, and RedLynx,...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Typosquatting?
27. Jun 2022
Typosquatting is a type of social engineering attack, where a threat actor registers domains with deliberately misspelled names...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Understanding the Importance of First Steps After a Ransomware Attack
19. Oct 2021
What to do and what not to do when you are under a ransomware attack? Despite a lot...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Industrial Cybersecurity and how to protect OT environments?
11. Oct 2021
The basics of OT security Industrial environments are a special challenge for IT security. What we have noticed...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
How to be secure from Ransomware?
6. Oct 2021
Ransomware 101 Jakob Premrn, cybersecurity expert at NIL, part of Conscia Group, explains what is Ransomware, why is...
Read more
Page
SOC (Security Operations Center) Building Services
Effective, automated, and economical Many large organizations have learned the hard way that efficient detection and response to...
Read more
Page
Solutions
Secure Industry Solutions for complex IT Infrastructures Deployed correctly, IT becomes a strategic tool leading to that decisive...
Read more
Blog
WannaTry again? SMBv3 Vulnerability Awakes!
11. Mar 2020
SMBv3 vulnerability (CVE-2020-0796) explained and how to defend against zero-day attacks While the world is struggling with real-life...
Read more
Stojan Rančić
IT Security Architect
Video
Zero Trust eXtended framework (and how to establish it with Cisco’s solutions)
How to achieve perimeterless security without harming productivity? In today’s business, your workforce, workloads, and workplace are literally...
Read more
Video
SOC Orchestra: The symphony of security tools
Efficiency in SOC: automation and orchestration Digitization is increasing the need to manage cyber risks. Because organizations find...
Read more
Video
Application performance and business optimization with Cisco AppDynamics
Real-Time Application Performance Monitoring with Cisco AppDynamics Cisco AppDynamics is a leading Application Performance Management (APM) solution that...
Read more
Jan Bervar
Security Architect
Blog
Dude, where’s my (cloud) firewall?
30. Mar 2017
I have always claimed that the tech side of cloud security is not about the trust you have...
Read more