SERVICES WITHIN cyber security

service offerings - descriptions

Below you find descriptions on all our services.
Click on an icon for more information on a specific service.
Please contact us, if you have any challenges or needs you would like to discuss.


Tech Blog and Cyber Blog

We continuously publish findings, perspectives and discussions on our two blogs.
Explore and subscribe to keep updated on current and future development within IT security.

bkl.png

Tech Blog

Here We’re posting technical subjects

Disclaimer: This blog post is not a complete guide on deploying Privileged Access Workstations (PAWs) that work in any environment. The information contained here defines the concept behind Privileged Access Workstations and presents a working generic implementation. (…)

improsec-p-010-1200x627_v2.png

Cyber Blog

Here We’re posting non-technical subjects

(In Danish:) Hydro er udsat for et ransomwareangreb med LockerGoga, meddeler de norske sikkerhedsmyndigheder. Også selskabets Active Directory er angrebet. (…)

 

Sign up for OUR blogs

Pick the blog(s) you wish to subscribe to: *
 

 

Central location in Downtown Copenhagen