Spring til navigering
Spring til hovedindholdet
Spring til sidefod
NCC Group
Menu
Jeres udfordringer
Åben undermenu for Jeres udfordringer
Hvor sikker er jeres virksomhed?
Hvordan bliver I compliant?
Hvordan beskytter I jeres kritiske aktiver?
Hvordan forbedrer I jeres it-sikkerhed?
Er I klar til et angreb?
Hvordan håndterer I risici i forsyningskæden?
Vores løsninger
Åben undermenu for Vores løsninger
Sikkerhedstest & Rådgivning
Sikkerhedstest & Rådgivning
Risk Management
Risikostyring af Forsyningskæden
Cloud-sikkerhed & Infrastruktur
Applikationer & Software
Mobil Sikkerhed
Sårbarhedsscanning
Hardware & Embedded Systems
Kryptografi
Detection & Response
Detection & Response
Managed Detection and Response
Incident Response
Threat Intelligence
Financial Anti-Fraud Management (DetACT)
Compliance
Compliance
Databeskyttelse
Stat & Sektor
Betalingssikkerhed
Software Resilience
Software Resilience
Escrow Aftaler
Escrow Verificering
Cloud Escrow
Remediering
Remediering
Remediate
Bug Bounty
Kurser
Jeres sektorer
Åben undermenu for Jeres sektorer
Finans og serviceudbydere
It, medier og telekommunikation
Transport og produktion
Offentlig sektor
Detailhandel
Energi og forsyning
Insights
Insights
Om os
Åben undermenu for Om os
Resource Hub
Det vi gør
Bæredygtighed
Investorer
Karriere
Resourcer
Resourcer
Nyheder
Teknisk blog
Søg
DK
Åben undermenu for regioner
United States
United Kingdom
Singapore
Australia
Japan
Switzerland
Netherlands
English
Belgium
English
Denmark
English
United Arab Emirates
Germany
Portugal
Sweden
Spain
Client login
Åben undermenu for Kundeportaler
Partner Network Portal
Managed Services Portal
Signify IMC Portal
Escrow View
Iron Mountain Connect
Skriv et søgeord
Resource Hub
Toggle filters
Filter content
Resource type
Blog Posts (11)
Webinars (1)
Emne
Third-Party Risk Management (1)
Managed Detection & Response (MDR) (1)
Assessments (1)
Technology (9)
General Consulting (8)
Telecom (1)
General data (1)
IT Consulting (1)
Apply filters
Reset filters
Blog Posts
Insider Threat: An Enemy in the Ranks
By
Sourya Biswas
19 Nov 2020
Webinars
Webinar: Security for Startups
By
Sourya Biswas
12 Oct 2020
Blog Posts
Startups don’t need cyber security (or do they?)
By
Sourya Biswas
16 Sep 2020
Blog Posts
Psychology of the Phish: Leveraging the Seven Principles of Influence
By
Sourya Biswas
28 Aug 2020
Blog Posts
Hospitals and ransomware weak cybersecurity
By
Sourya Biswas
26 Jun 2020
Blog Posts
Can you have too much security? How to be in the "Goldilocks" zone
By
Sourya Biswas
03 Apr 2020
Blog Posts
Are You Evaluating Your Target Acquisition Through the Cyber Security Lens?
By
Sourya Biswas
12 Mar 2020
Blog Posts
Which security framework is right for you?
By
Sourya Biswas
15 Jan 2020
Blog Posts
Lessons from blockbusters: What Hollywood can teach us about cyber security
By
Sourya Biswas
18 Dec 2019
Blog Posts
Trust, but verify (your third-party vendors) (1)
By
Sourya Biswas
11 Dec 2019
Show more