SolutionsSolutionsAI, Data Center, and CloudRead moreBusiness ContinuityRead moreData Center Automation and ManagementRead morePrivate Cloud Design and Data Center TransformationRead morePublic and Hybrid CloudRead moreNetworkingRead moreBuilding and Deploying NetDevOps Environments and ProcessesRead moreCore/Edge Network OptimizationRead moreData Center, Cloud Networking and SDNRead moreIPv4 / IPv6 and Ethernet ArchitectureRead moreNetwork Function VirtualizationRead moreNetwork Migration for Service ProvidersRead moreNetwork Service OrchestrationRead moreOptical TransportRead moreSD-WAN Design and Deployment ServicesRead moreSecure SD-WAN as a ServiceRead moreCybersecurityRead moreAdvanced Malware Protection (AMP)Read moreCloud SecurityRead moreIncident ResponseRead moreIndustrial Cyber Defense and ProtectionRead moreNetwork Infrastructure and Security AuditRead moreRisk and Security AssessmentRead moreManaged Security Operations Center (MDR) ServicesRead moreSecure and Compliant CollaborationRead moreSecure MobilityRead moreSOC (Security Operations Center) Building ServicesRead moreZero Trust ArchitectureRead moreDigital workspaceRead moreContact Center in the CloudRead moreDesktop and Application VirtualizationRead moreEnterprise CollaborationRead moreEnterprise MobilityRead moreHybrid Cloud Collaboration Migration and DeploymentRead moreInterconnecting Collaboration Tools and PlatformsRead moreIT-as-a-ServiceRead moreServicesServicesNIS-2 Overview and RecommendationsRead moreCybersecurity Maturity AssessmentRead moreConsultingRead moreContent DevelopmentRead moreEducationRead moreImplementationRead moreProject ScopingRead moreSupport and OperationsRead moreSystem DesignRead moreManaged Microsoft DefenderRead moreManaged Cloud Disaster RecoveryRead moreManaged Cloud Data CenterRead moreNIL Advanced Service IntelligenceRead moreManaged Data Center InfrastructureRead moreNIL Microsoft SupportRead moreManaged Secure BackupRead moreManaged Server Operating SystemsRead moreManaged FirewallRead moreManaged WAF and Load BalancerRead moreKnowledgeKnowledgeBlogsRead moreSuccess StoriesRead moreVideosRead moreWhitepapersRead moreLatest Video
NIS 2: Understanding what matters now
NIS 2 is reshaping how organisations approach digital resilience. In this webinar, we looked at…
Read moreEventsCareersAbout NILRead moreCompanyRead moreLeadershipRead moreSustainability and social responsibilityRead morePressRead moreLatest News
NIL receives F5 Partner of the Year award
NIL has received the prestigious F5 Partner of the Year award, presented by F5 Networks…
Read moreGlobal/EnglishBelgium/DutchDenmark/DanishGermany/GermanIreland/EnglishNetherlands/DutchNorway/NorwegianSweden/SwedishUK/EnglishGlobal/EnglishBelgium/DutchDenmark/DanishGermany/GermanIreland/EnglishNetherlands/DutchNorway/NorwegianSweden/SwedishUK/EnglishNIL LearningContactHomeShow allSuccess StoriesEventsBlogsVideosNewsPress releasesWhitepapersDavid Kasabji
Principal Threat Intelligence Engineer
Blog
200 weeks of ThreatInsights: What our most‑read articles tell us about today’s threat landscape
1. Apr 2026
For 200 consecutive weeks, Threat Insights has analysed real‑world cyber threats facing European organisations. To mark the milestone, we revisited the archive to identify the five most‑read articles — revealing...
Read moreOctavio Harén
CISO & Business Area Manager Cybersecurity, Conscia Sweden
Blog
A roadmap for developing an AI governance framework
19. Mar 2026
AI is already here, but who is really in control? It has quietly made its way into organisations,...
Read moreBlog
AI Security in Three Steps – 3: protect
19. Mar 2026
Now that AI is being used broadly, visibility and warning signs are no longer enough. What matters is...
Read moreBlog
AI Security in three steps – 2: detect
19. Mar 2026
Seeing how AI is used is one thing. Understanding when it starts creating real risks is something else...
Read moreBlog
AI Security in three steps – 1: discover
19. Mar 2026
Driven by employees’ curiosity, AI use is spreading through organisations faster than most can keep up with. When...
Read moreLars Erik Braatveit
CTO, Conscia Norway
Blog
Cisco Live Europe 2026 – All in on AI
17. Feb 2026
For those of us who work with Cisco technology, Cisco Live is the event of the year. Cisco...
Read moreBeno Ceglar
Chief Executive Officer
Blog
Slovenia’s quiet revolution in tech leadership
3. Feb 2026
Inside NIL’s approach to enterprise security with Beno Ceglar, general manager of NIL, part of Conscia. What makes...
Read moreMatevž Mesojednik
Security Operations Center (SOC) Manager
Blog
The Core of (Cyber)security? Human Intelligence.
3. Feb 2026
In cybersecurity, technology is crucial, but people make the real difference. How do you build a culture of...
Read moreAna Strnad Hočevar
Blog
OT Security built for resilience: Why modern industrial environments need a new approach
2. Feb 2026
Technological progress has accelerated IT and OT environments have evolved just as quickly. Today’s industrial systems are merging...
Read moreBeno Ceglar
Chief Executive Officer
Blog
Slovenia has the potential to play among the best—but only if we work together
20. Jan 2026
As 2025 approached its end and a new chapter in the business and economic sphere in Slovenia and the...
Read moreJure Jereb
Technical team lead
Blog
News from Microsoft Ignite 2025
22. Dec 2025
Microsoft Ignite is an annual event aimed at IT professionals, developers, and Microsoft partners to learn, share ideas,...
Read moreIztok Umek
Consulting Engineer
Blog
Cisco Cyber Vision: the game-changer for industrial cybersecurity
22. Oct 2025
Discover how Cisco Cyber Vision delivers full visibility, threat detection and IT/OT integration for industrial networks—transforming cybersecurity in...
Read moreDavid Kasabji
Principal Threat Intelligence Engineer
Blog
SIEMs falling short: 80% of threat techniques go undetected
2. Jul 2025
Despite significant investments, modern SIEM platforms fail to detect nearly 80% of known MITRE ATT&CK techniques. This critical...
Read moreDavid Kasabji
Principal Threat Intelligence Engineer
Blog
Stolen Credentials: The Number One Breach Vector and the Underground Economy Behind It
5. Mar 2025
In recent years, stolen login credentials have become the top initial attack vector in cyber breaches, eclipsing other...
Read moreMihail Guguvčevski
IT Architect
Blog
AI Insights in Tech
27. Jan 2025
The questions below have been designed to explore the current and future strategies and use of AI, while...
Read moreBlog
Important Update for All Using Certificates for Single Sign-On
21. Jan 2025
Do you use Kerberos SSO with certificate-based authentication (CBA), e.g., for validating intranet and file/print servers? If so,...
Read moreDavid Kasabji
Principal Threat Intelligence Engineer
Blog
Offensive Security and Cyber Threat Intelligence: The Dynamic Duo Against Adversaries
19. Dec 2024
In an age where cyber threats evolve faster than ever, traditional approaches to security often fall short. Firewalls,...
Read moreBlog
10 Secure online shopping tips for the Christmas season
6. Dec 2024
The holiday season is upon us, and alongside the magic of Christmas comes the pressure of secure online...
Read moreBlog
Protecting Your Business from Supply-Chain Attacks: What to Do When Third Parties Are Breached
17. Oct 2024
In today’s interconnected digital ecosystem, businesses rely heavily on third-party vendors for various tools, technologies, and services. While...
Read moreBlog
Cybersecurity Starts at Home: A Call to IT Professionals
26. Sep 2024
As IT professionals, we are responsible for ensuring that our family, friends, and neighbors don’t become victims of...
Read more235»NIL LEARNINGSUBSCRIBEAI, Data Center, and CloudAdvanced NetworkingCybersecurityDigital workspaceConsultingProject ScopingSystem DesignImplementationSupport and OperationsEducationContent DevelopmentNewsEventsPressKnowledgeAboutReferences & Client testimonialsPartnersAwards & Industry RecognitionsOur LeadershipWORK@NILStudentsOpen positionsTerms of UsePrivacy PolicySecurity ClassificationCookies Information
智能索引记录
-
2026-04-18 17:27:20
综合导航
成功
标题:Hotel de lujo en Guangzhou Vignette Collection The Xanadu Guangzhou
简介:Vignette Collection El Xanadu Guangzhou ubicado en es un hot
-
2026-04-27 15:17:31
综合导航
成功
标题:尹烨
简介:有料、有趣的基因科普栏目
-
2026-04-28 01:46:20
综合导航
成功
标题:OEP 2025 de la Agencia Tributaria de Cataluña: 77 plazas para reforzar el personal especializado CEF
简介:Una gran oportunidad que busca consolidar los equipos técnic
-
2026-04-23 17:33:53
综合导航
成功
标题:j7.com - This website is for sale! - j7 Resources and Information.
简介:This website is for sale! j7.com is your first and best sour
-
2026-04-25 06:20:15
综合导航
成功
标题:MP Men's Retro Graphic Collared 1/4 Zip - Grey Marl
简介:Shop MP Men