Follow NNIT

Tags

Till the next WannaCry campaign

Till the next WannaCry campaign

Blog posts   •   May 24, 2017 08:39 GMT

​Security practice is shifting from prevention to detection. Wannacry proves that detection can be straightforward.

Breach Preparedness

Breach Preparedness

Blog posts   •   May 23, 2017 06:59 GMT

9-1-1 or 1-1-2 is used globally when calling for help. But which number is used for requesting cyber-help?

 How to use Digitization, Big Data and Machine Learning in Healthcare

How to use Digitization, Big Data and Machine Learning in Healthcare

Blog posts   •   Apr 18, 2017 10:52 GMT

Super exciting read from Kasper Jensen, consultant in NNIT, who just got his paper published in Springer Nature. The paper describes how to use Digitization, Big Data and Machine Learning in Healthcare to help healthcare providers profile cancer patients and "catch” patient events and disease progression in due time: http://go.nature.com/2pumoGG

Denmark is the place-to-be, if you want to start up your IT career
The security risks of black box technology

The security risks of black box technology

Blog posts   •   Mar 07, 2017 14:34 GMT

Do you see a need for security protection in regards to protect your business from financial and reputational damage? Read Helge Skov Diernæs, CISM certified security professional from NNIT A/S's column about the subject here: http://bit.ly/2lYkk4J

What to watch out for in IT Security in 2017

What to watch out for in IT Security in 2017

Blog posts   •   Feb 13, 2017 10:41 GMT

Cyber threats become increasingly sophisticated intensifying the need for more advanced responses http://bit.ly/2lFOqcu

Suddenly the plans were all history

Suddenly the plans were all history

Blog posts   •   Jan 27, 2017 09:53 GMT

Fantastic read from real life: ''Suddenly the plans were all history'' by Johann Gautier, Gung Ho, Vice President for Management Consulting in NNIT.

Nobody wants to pay 4% of their turnover in fines

Nobody wants to pay 4% of their turnover in fines

Blog posts   •   Dec 12, 2016 12:12 GMT

Nobody wants to pay 4% of their turnover in fines, so companies and authorities are finding smart ways to comply with the new regulations on personal data. Identity and Access Management is key to staying in control.

​SAP has introduced the API Business Hub

​SAP has introduced the API Business Hub

Blog posts   •   Nov 09, 2016 14:12 GMT

​SAP has introduced the API Business Hub, which exposes SAP processes and data as APIs.

Hackers can easily exploit known vulnerabilities

Hackers can easily exploit known vulnerabilities

Blog posts   •   Nov 02, 2016 08:36 GMT

Hackers can easily exploit known vulnerabilities, says Artur Ganc, Principal Consultant in NNIT A/S. Get his 10 steps to successful patch management framework here: http://bit.ly/2evEu2f

Keep your sensitive data secure

Keep your sensitive data secure

Blog posts   •   Oct 13, 2016 07:37 GMT

Be aware of the RATs

Be aware of the RATs

Blog posts   •   Sep 09, 2016 07:21 GMT

Be aware of the RAT's - a deep dive into the area of Remote Administration Tools (RATs) by John Clayton, IT Management Consultant and Cyber Security Specialist in NNIT: http://bit.ly/2caislG

Control Your Security & Privacy in the Cloud

Control Your Security & Privacy in the Cloud

Blog posts   •   Aug 09, 2016 07:28 GMT

Many companies worry about security and privacy when migrating to cloud services. Read more here: http://bit.ly/2aNYxtT

​Open doors to creative criminals

​Open doors to creative criminals

Blog posts   •   Aug 03, 2016 07:55 GMT

This could be the golden age of computer hacking and Cybercrime.

​Yes, we need protection, all of us!

​Yes, we need protection, all of us!

Blog posts   •   Jun 03, 2016 13:19 GMT

​Yes, we need protection, all of us! Good read from John Clayton, Cyber Security Specialist, in NNIT A/S. ​Read the full article here.

A break in into the ICS/SCADA system can disturb, corrupt or even destroy your production

A break in into the ICS/SCADA system can disturb, corrupt or even destroy your production

Blog posts   •   May 20, 2016 11:53 GMT

Do you remember the latest stories in the news where cyber-criminals caused hundreds of domestic and international flights to be grounded at multiple airports across Sweden due to its air traffic control system being disabled, and where a nuclear power plant in Germany was infected with computer viruses via USB sticks?

Hacked power stations, crashed airplanes, or dark streets - a direct result of compromised process control systems

Hacked power stations, crashed airplanes, or dark streets - a direct result of compromised process control systems

Blog posts   •   May 09, 2016 12:21 GMT

Hacked power stations, crashed airplanes, or dark streets would be a direct result of compromised process control systems. If you were in charge of security, how would you deal with this?