Skip to content

News archive

  • Denmark is the place-to-be, if you want to start up your IT career

    Denmark is the place-to-be, if you want to start up your IT career

    "Dare to start from scratch and dive into algorithms, data structures, discrete mathematics, the variety of programming languages, or into whatever makes your heart pound faster", says J. Rika Pydde, Junior Consultant, from NNIT. Read the full article here.

  • The security risks of black box technology

    The security risks of black box technology

    Do you see a need for security protection in regards to protect your business from financial and reputational damage? Read Helge Skov Diernæs, CISM certified security professional from NNIT A/S's column about the subject here: http://bit.ly/2lYkk4J

  • Suddenly the plans were all history

    Suddenly the plans were all history

    Fantastic read from real life: ''Suddenly the plans were all history'' by Johann Gautier, Gung Ho, Vice President for Management Consulting in NNIT.

  • Nobody wants to pay 4% of their turnover in fines

    Nobody wants to pay 4% of their turnover in fines

    Nobody wants to pay 4% of their turnover in fines, so companies and authorities are finding smart ways to comply with the new regulations on personal data. Identity and Access Management is key to staying in control.

  • Hackers can easily exploit known vulnerabilities

    Hackers can easily exploit known vulnerabilities

    Hackers can easily exploit known vulnerabilities, says Artur Ganc, Principal Consultant in NNIT A/S. Get his 10 steps to successful patch management framework here: http://bit.ly/2evEu2f

  • Keep your sensitive data secure

    Keep your sensitive data secure

    Data Access Governance requires careful consideration, be balanced to business needs, and needs to be based on how important it is to keep your sensitive data secure. Happy to announce yet another Security Insight blog post. Today published by Johan Holkmann Jacobsen, Identity & Access Management Senior Consultant in NNIT A7S. Read more here. 

  • Be aware of the RATs

    Be aware of the RATs

    Be aware of the RAT's - a deep dive into the area of Remote Administration Tools (RATs) by John Clayton, IT Management Consultant and Cyber Security Specialist in NNIT: http://bit.ly/2caislG

  • ​Yes, we need protection, all of us!

    ​Yes, we need protection, all of us!

    ​Yes, we need protection, all of us! Good read from John Clayton, Cyber Security Specialist, in NNIT A/S. ​Read the full article here.

Show more