SERVICES WITHIN cyber security
service offerings - descriptions
Below you find descriptions on all our services.
Click on an icon for more information on a specific service.
Please contact us, if you have any challenges or needs you would like to discuss.
Tech Blog and Cyber BlogWe continuously publish findings, perspectives and discussions on our two blogs.
Explore and subscribe to keep updated on current and future development within IT security.
Here We’re posting technical subjects
Disclaimer: This blog post is not a complete guide on deploying Privileged Access Workstations (PAWs) that work in any environment. The information contained here defines the concept behind Privileged Access Workstations and presents a working generic implementation. (…)
Here We’re posting non-technical subjects
(In Danish:) Hydro er udsat for et ransomwareangreb med LockerGoga, meddeler de norske sikkerhedsmyndigheder. Også selskabets Active Directory er angrebet. (…)