Menu
Offerings
Back
Offerings
Networking
We can help you select, implement, operate, and optimise new technologies into your solution in its entire lifecycle.
Read more
Cybersecurity
We cover all aspects of your environment, from physical security, infrastructure, and applications, to staff security awareness education.
Read more
Data center & cloud
On-prem, private, hyper or multi-cloud? Our data center and cloud experts can work with you to evolve your data center and operations into a flexible and risk-proof IT environment.
Read more
Solutions
Back
Solutions
Networking
Today, the network touches everything in any company. This makes it an ideal platform for improving security and business efficiency.
Read more
Network Automation
Automate manual tasks, and your ICT will be more agile, faster, and flexible. Achieved with lower operational costs and fewer resources.
Read more
Local Area Network
Remote workplaces add more requirements to the local network and make it your company’s heart.
Read more
Wireless network
We have a long track record of implementing indoor and outdoor wireless networks in all industries.
Read more
Conscia PowerSave
By automatically disabling wireless networks when not in use, Conscia PowerSave helps to reduce energy consumption, carbon footprint, and costs.
Read more
WAN and Service provider networks
When your network is serving large companies, and their customers, requirements are equally big.
Read more
Cybersecurity
Cyber Security is not only about avoiding risk. A proper security setup also helps your business stay ahead.
Read more
Network Security
Networks are one of the best battlegrounds to stop, contain, or detect attacks.
Read more
Endpoint Protection
Protecting your endpoint devices from cyber threats is vital to prevent and limit damage to your business.
Read more
Conscia Maturity Assessment
Conscia’s Maturity Assessment is a full-service package that provides you with tailored insights and actionable recommendations.
Read more
Conscia ThreatInsights
Get weekly updates about incidents, exploits, malware, and other cybersecurity relevant information from our Threat Intelligence and Reverse Engineering experts.
Read more
Data Center & Cloud
For organisations aiming to stay ahead, choosing the right Data Center and Multicloud solutions is crucial.
Read more
Public, Private and Hybrid Cloud
Increase flexibility with public, private and hybrid cloud solutions.
Read more
Software-defined Network (SDN) for data centers
Build a more secure, more manageable and better-performing network.
Read more
Server
It used to be all about capacity and performance, but today organisations should demand more from their server platforms.
Read more
Storage
From traditional disc storage to server-based storage and cloud storage: The options in the area are plenty.
Read more
Digital Workspace
In the age of mobility and cloud, information has become available to employees from any device and any place.
Read more
Services
Back
Services
Managed Services
Simple, Flexible, and Scalable Services that support your legacy infrastructure.
Read more
Managed Network Services
Our Network Operations Center (NOC) monitors complex networks, detects faults, solve problems immediately, and more.
Read more
Managed Security Services
Advanced managed detection and response services, provided by a Security Operations Center (SOC), enable you to minimize risks and costs by detecting IT security threats at an early stage
Read more
Managed Datacenter & Cloud services
Let us manage the operation of your Cloud platform. Our certified consultants are ready with on-call 24-hour support – all year round.
Read more
Service & Support
Secure immediate access to highly qualified help in case of incidents and support the preparation of a long-term plan for managing network devices.
Read more
Conscia Care
Conscia Care is the cornerstone and foundation for stable operations.
Read more
Expertise Consultancy
Get access to operational consultants with long experience and heavy competencies within network infrastructure.
Read more
Conscia Network Services (CNS)
Our award-winning Customer Service Platform, we offer automated asset management for even the most complex infrastructures.
Read more
Industry cases
Careers
About us
Back
About us
About Conscia
Read more
Conscia Leadership
Read more
Partners & Awards
Read more
Sustainability
Read more
Pressroom
Read more
News
Login
Login to CNS
Search for:
Choose your local market:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Search for:
Search
Login
Login to CNS
Contact
Get the
latest insights
in our blog, written by
our own experts
.
Home
»
Blog
Show all
Cases
Events
Blogs
Recorded webinars
Guides
News
Press releases
Whitepapers
Show Filters
Industries
All
Education
Energy/Utilities
Local Government / Municipalities
Solutions & Services
AI
Analytics
Automation
Cloud
Compliance
Conscia Service Portal
Cybersecurity
Data Center
Internet of Things (IoT)
Lifecycle Advisory
Managed Services
Mobility
Networking
NIS2
SASE
sd-wan
Services
SOC
Software
Threat Intelligence
Unified Communication
Wireless
Business outcome
Cost Predictability
Digital Transformation
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
Blog
Critical vulnerability in Palo Alto Gateway
12. April 2024
NOTE, important update 17/4-24: Temporarily disabling device telemetry has unfortunately proven insufficient. Updated information (17/4 2024): This vulnerability in GlobalProtect, initially believed to be mitigated by disabling Device Telemetry...
Read more
Jonas Eliasson
Account Manager, Conscia Sweden
Blog
4 Network Challenges and the Path to a Simple, Secure Network Solution
12. April 2024
Many organizations are stuck with an older, complex network solution that is difficult to grow with. Let’s take...
Read more
Kristian Krogsgaard Larsen
Blog
Unleashing Business Potential with Wi-Fi Tracking
25. March 2024
Discover how Wi-Fi tracking revolutionizes user data collection, enhances customer understanding, and drives innovation across industries by leveraging...
Read more
Blog
7 IT Superpowers Using Observability
21. March 2024
In a world where digital transformation constantly rearranging the business landscape, IT needs to stay on top of...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Exploring the Dark Side of Generative AI: The Rise of Cyber Threats in the Digital Age
13. March 2024
When we think about predicting cyber threats that will reign in the coming year, we often lean back...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
OpenAI Sora – Threat or Opportunity?
4. March 2024
OpenAI's Sora: Is it a threat or an opportunity? We look at its groundbreaking text-to-video capabilities and how...
Read more
Blog
Smart Offices of Tomorrow: The Workplace Revolution
3. March 2024
Learn how Cisco MTR (Microsoft Teams Rooms) and technologies such as AI, IoT, and automation will continue to...
Read more
Alexander Viftrup Andersen
Security systems engineer
Blog
Cisco Security 2023 – The Year in Review
15. February 2024
I hope you have landed well in the new year without any major technical fires that needed extinguishing...
Read more
Max Geiger
Consultant - PCNSE
Blog
Urgent update Palo Alto Networks NGFW
13. February 2024
Palo Alto Networks certificate expiration – act as soon as possible: Palo Alto Networks are currently facing an...
Read more
Caroline Dristig
Consultant, Conscia Sweden
Blog
Secure Your Supply Chain: Why and How
5. February 2024
In an increasingly interconnected world, companies and organizations rely heavily on their suppliers and third-party actors, especially concerning...
Read more
Blog
Interview: Artificial intelligence in cybersecurity: who will make better use of it?
11. January 2024
AI helps both hackers and those who fight them – but in addition to sophisticated security solutions, it...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes
9. January 2024
GitHub, a key coding platform, faces rising cyber threats. This blog post explores its exploitation and outlines effective...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity
19. December 2023
In cybersecurity, an unexpected one-time passcode (OTP) signals a security threat - possible credential theft. Learn more about...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Deep Dive into the May 2023 Cyber Attack on Danish Energy Infrastructure
15. November 2023
Danish energy infrastructure endured a sophisticated cyber attack, signifying a major escalation. This post analyzes the unprecedented assault,...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
What can we learn from recent Okta breaches?
8. November 2023
Okta, a major identity and access management player, faced two major security breaches. Examining these incidents provides crucial...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
New Critical Vulnerability in Cisco IOS XE Software Poses Cybersecurity Concerns
17. October 2023
Edit note, October 24: Added a section regarding updates to include additional Indicators of Compromise (IOCs) and methods...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data
11. October 2023
Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and validate payment card...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Adversary-In-The-Middle Attack: A novel way to evade MFA
3. October 2023
In the vast realm of cyber threats, a relatively newer but impactful method has emerged: Adversary In the...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How Cybercriminals Exploit Legitimate Internet Services for Malicious Purposes
27. September 2023
Cybercriminals increasingly manipulate reputable platforms such as Google Drive, OneDrive, Notion, and GitHub to camouflage their malicious activities...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Defending Against Infostealer Malware Attacks: A Comprehensive Guide for Organizations
19. September 2023
In today’s digital age, information is power. As organizations increasingly rely on digital data, the allure for cybercriminals...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Cloud Storage Risk Assessment: Our privacy rests… at risk?
13. September 2023
Cloud storage and hosting have become a common way of storing your and your organization’s sensitive data in...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Understanding Vulnerability Lifecycle to Better Combat Exploits
6. September 2023
If you care about cybersecurity, you surely have heard the term ‘software vulnerability.’ But it can quickly happen...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
CL0P Group – Analysis of European’s rising ransomware threat
6. September 2023
If you were following trends in the cyber threat landscape for the past few months, or actually the...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Danish cloud-hosting provider hit by devastating ransomware attack.
30. August 2023
Danish cloud-hosting company were hit by ransomware attacks, resulting in significant customer data loss and system shutdowns.
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
A look into Living off the Land adversarial technique
30. August 2023
Recently, you may have noticed several cybersecurity news sites citing Microsoft’s article on Flax Typhoon’s (threat actors) stealthiness while performing...
Read more
Blog
Security Update: Vulnerability in SD-WAN vManage – Act Now
14. July 2023
Cisco has discovered a critical vulnerability in SD-WAN vManage. We urge all individuals responsible for managing such a...
Read more
Anders Pedersen
Cloud Solution Architect, Conscia Denmark
Blog
Can Prisma Cloud provide API security for your cloud?
15. March 2023
Spoiler alert: it probably can (your mileage may vary), but your cloud architecture determines whether it is the...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How could AI simplify malware attacks, and why is this worrying?
24. February 2023
AI can significantly reduce Malware development and distribution costs, giving cybercriminals an advantage over insufficiently secured targets. Read...
Read more
Jure Planinšek
Head of Compliance and Legal, NIL - Part of Conscia
Blog
Diligent Management and Cybersecurity
20. February 2023
In business, cyber-attacks have become a part of reality and are no longer something that happens “out there”....
Read more
Pascal Huijbers
CTO, Conscia Group
Blog
The future of AI and Quantum
14. January 2023
Artificial intelligence and quantum computing are two rapidly advancing technologies that have the potential to revolutionize a...
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager, NIL
Blog
Three lessons for better cybersecurity in 2023
2. January 2023
From the point of view of Conscia’s Security Operations Center (SOC), the year 2022 confirmed the fact that...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin
6. December 2022
Criminals don’t like to leave traces. In the cyber world, that means deleting their malicious software from your...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Season’s Greetings from Cybercriminals
25. November 2022
Cybercrime is on the rise during the holiday season. Cybercriminals take advantage of Black Friday, Cyber Monday, and...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Phishing as a Service (PHaaS) – an effective attack vector for all threat actors
17. November 2022
Phishing has professionalized. It is literally available to criminals in a »as a service« model, and the most...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
New 0-day vulnerabilities in Microsoft Exchange Server actively exploited
30. September 2022
Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Insider Threats: What are they and how to mitigate them
20. September 2022
While often neglected, an organization’s own personnel pose one of the biggest threats to its security. Human error...
Read more
Robert Gustafsson
Sales & Marketing Director, Conscia Sweden
Blog
Cisco Enterprise Agreement 3.0 – EA Agreement: What is new and what is right for you
1. September 2022
The Cisco Enterprise Agreement is now available in version 3.0. It simplifies your Cisco solutions’ purchase, consumption, and...
Read more
1
2
3
»
Contact
Contact us now