Need Proof?

Take your peers word for it…

Review our case studies and get the full story about how we helped our customers solve some of their top challenges and achieve measurable business results.

Filters
Industries
Solutions & Services
Business outcome
Delavska hranilnica
Case

Conscia SOC at Delavska hranilnica bank

Read more
Andreas di Zazzo Senior Network Architect and double CCIE at Conscia Sweden
Post

How to segment your industrial network – a practical methodology!

Read more
Network coverage
Andreas di Zazzo Senior Network Architect and double CCIE at Conscia Sweden
Post

How to Segment your Industrial Network – a practical methodology!

Read more
Lateral Movement - advanced cybercrime
Jon-Anders Frigård Senior IT Architect, CCIE and Security Expert at Conscia Norway
Post

Lateral Movement – advanced cyber crime

Read more
ICS OT Security
Danijel Grah Cybersecurity Analyst at NIL (part of Conscia Group)
Post

First steps toward ICS/OT Security

Read more
Jan Bervar
Jan Bervar Group Security Architect
Post

Is your cyber defense strategy a waste of money?

Read more
Tom Kern Senior Cyber Security Analyst and Researcher
Post

What is a Threat Detection Framework?

Read more
David Kasabji
David Kasabji Cyber Security Analyst
Post

WannaTry again? SMBv3 Vulnerability Awakes!

Read more
SIEM
Henrik Skovfoged - Group Product Director, Security - Conscia
Henrik Skovfoged Group Product Director, Security
Post

To SIEM or not to SIEM

Read more
Login – the problem that never disappears.
Mikael Gustafsson Mikael Gustafsson
Post

Login – the problem that never disappears. Now there is a possibility!

Read more
Case

University of Southern Denmark

Read more
Post

DNS: High security with low costs

Read more
Case

The Best Help Within Five Minutes

Read more
Case

Safer financial systems with Cisco

Read more
Post

Is our digital maturity a house of cards?

Read more
Case

When the iPhone is a Good Business Case

Read more
Post

Exploit the implementation of Firepower!

Read more
Post

VPNFilter – how to protect yourself

Read more
Post

First line of defense with DNS Security

Read more
Post

IoT – like Internet of Trouble

Read more
1 2