Skip to main content
Show submenu for Services
Services
Show submenu for MDR
MDR
Private Sector
Municipal Sector
OT-systems
Show submenu for Additional
Additional
Vulnerability Scanning
Phishing Response
Show submenu for Penetration Testing
Penetration Testing
Penetration Testing
Phishing
Show submenu for Secure Operations
Secure Operations
Secure Operations
Secure Networking (NaaS)
Secure Backup
Patch Management
Secure Workplace
Incident Response
Strategic Advisors
OT – Industrial Cyber Security
Hire a Consultant
Show submenu for Products & Solutions
Products & Solutions
Show submenu for Cyber Security
Cyber Security
Cyber Security
Cloud Security
E-mail Security
Mobile Phone Security
Endpoint Security
Security Awareness Training
Firewall Security
Show submenu for Networking
Networking
Networking
Wireless Networking
Wired Networking
Networking
Management
Show submenu for OT
OT
IMCI Technologies
RAD Data Communications
Lantronix
Show submenu for About
About
About Netsecurity
Show submenu for Technology Partners
Technology Partners
Technology Partners
Palo Alto Networks
Extreme Networks
Dell
Proofpoint
Microsoft
Other partners
Partner Sale
Show submenu for Career in Netsecurity
Career in Netsecurity
Vacancies
Career in Netsecurity
Corporate Social Responsibility
Zero Trust
Privacy
Get in touch
Support
General terms
and conditions
The Transparency Act
Show submenu for Resources
Resources
Security insights blog
Customer Testimonials
News
Show submenu for translations
EN
Norwegian
Swedish
Open main navigation
Close main navigation
Show submenu for Services
Services
Services
Show submenu for MDR
MDR
MDR
Private Sector
Municipal Sector
OT-systems
Show submenu for Additional
Additional
Additional
Vulnerability Scanning
Phishing Response
Show submenu for Penetration Testing
Penetration Testing
Penetration Testing
Penetration Testing
Phishing
Show submenu for Secure Operations
Secure Operations
Secure Operations
Secure Operations
Secure Networking (NaaS)
Secure Backup
Patch Management
Secure Workplace
Incident Response
Strategic Advisors
OT – Industrial Cyber Security
Hire a Consultant
Show submenu for Products & Solutions
Products & Solutions
Products & Solutions
Show submenu for Cyber Security
Cyber Security
Cyber Security
Cyber Security
Cloud Security
E-mail Security
Mobile Phone Security
Endpoint Security
Security Awareness Training
Firewall Security
Show submenu for Networking
Networking
Networking
Networking
Wireless Networking
Wired Networking
Networking
Management
Show submenu for OT
OT
OT
IMCI Technologies
RAD Data Communications
Lantronix
Show submenu for About
About
About
About Netsecurity
Show submenu for Technology Partners
Technology Partners
Technology Partners
Technology Partners
Palo Alto Networks
Extreme Networks
Dell
Proofpoint
Microsoft
Other partners
Partner Sale
Show submenu for Career in Netsecurity
Career in Netsecurity
Career in Netsecurity
Vacancies
Career in Netsecurity
Corporate Social Responsibility
Zero Trust
Privacy
Get in touch
Support
General terms
and conditions
The Transparency Act
Show submenu for Resources
Resources
Resources
Security insights blog
Customer Testimonials
News
Show submenu for translations
EN
English
Norwegian
Swedish
Search
Portal
Under attack?
Portal
Under attack?
Search
Security insights blog
June 03, 2025
Cybersecurity during holiday time: Increased risk with low staffing
March 07, 2025
Security management for IT-OT integrations and supplier management
February 11, 2025
Code Execution Through Ghostty Window Title
August 23, 2024
Cyber attacks: Surprisingly few know who to call when they're attacked
August 23, 2024
No coincidence that we have become one of Norway's leading competence centers for Palo Alto Networks
August 23, 2024
ANSI Escape Injection vulnerability in WinRAR
August 23, 2024
Memory consumption vulnerability in libvte (CVE-2024-37535)
August 23, 2024
Red Team in Las Vegas: Highlights from Hacker Summer Camp 2024