CSIS

The Hub

Welcome to the Hub!
Access our multimedia content here.

Recorded Webinars

April 20, 2022

Cybersecurity Brief Ukraine Crisis and the Latest Threat Matrix Report

February 1, 2022

Cyber Defence Feed

January 19, 2022

Cyber threat predictions for 2022

April 20, 2021

Exclusive Preview of the Threat Matrix H2 2020

April 14, 2021

The Bagsu banker case - journey into a carding operation

Cyber threat predictions for 2021: What to expect from the coming year?

How to build an excellent SIEM with CSIS Managed Detection & Response

Exclusive Preview of the Threat Matrix H1 2020

How compromised O365 accounts lead to financial loss

Insecure About Web Security

COVID-19 Threat Landscape Update

Inside the Threat Matrix Latest Malware Trends Real-World Scenarios

COVID-19 Update On The Threat Landscape

The Magecart Phenomenon

Business Email Compromise: Understand it, Detect it, Prevent it

View more

Cybersecurity conferences 2022

September 22, 2022

September 22, 2022

Konference om Persondatabeskyttelse og Cybersikkerhed

September 29, 2022

September 29, 2022

War of the worlds: a study in a ransomware IR learnings & victories

Oktober 3, 2022

Oktober 3, 2022

Få inspiration til cybersecurity på TOPMØDE

Oktober 13, 2022

Oktober 13, 2022

Erhvervskonference - Ledelse i krisetider

November 10, 2022

November 10, 2022

Cybersikkerhed i Danmark?

November 10, 2022

November 10, 2022

Cybersikkerhed i Danmark - Online Live

View more

Threat Matrix Report

Threat Matrix Report H2 2021

Threat Matrix Report H2 2021

Threat Matrix Report H1 2021

Threat Matrix Report H1 2021

Threat Matrix Report H2 2020

Threat Matrix Report H2 2020

Threat Matrix Report H1 2020

Threat Matrix Report H1 2020

Case studies

Case study Chronos

Case study Chronos

Leveraging its proprietary Chronos platform, CSIS delivers best-in-class Incident Response services and minimizes damage caused by a major ransomware attack.

Case study CIRK

Case study CIRK

CSIS's remote forensics tool helps a lading UK bank prevent fraud.

Case study MDR

Case study MDR

A leading Danish digitization company leverages CSIS's MDR Services to maintain a best-in-class security posture.

Products and services videos

Compromise Assessment

Compromise Assessment

How can you be sure your network hasn’t been breached by hackers? Find out why you need to undertake periodic compromise assessments.

Newsletter

Cyber Bytes, August 2022

Cyber Bytes, August 2022

Cyber Bytes, July 2022

Cyber Bytes, July 2022

Cyber Bytes, June 2022

Cyber Bytes, June 2022

Cyber Bytes, May 2022

Cyber Bytes, May 2022

Cyber Bytes, April 2022

Cyber Bytes, April 2022

Cyber Bytes, March 2022

Cyber Bytes, March 2022

Cyber Bytes, February 2022

Cyber Bytes, February 2022

Cyber Bytes, January 2022

Cyber Bytes, January 2022

Cyber Bytes, December 2021

Cyber Bytes, December 2021

Cyber Bytes, November 2021

Cyber Bytes, November 2021

Cyber Bytes, October 2021

Cyber Bytes, October 2021

Cyber Bytes, September 2021

Cyber Bytes, September 2021

Cyber Bytes, August 2021

Cyber Bytes, August 2021

Cyber Bytes, July 2021

Cyber Bytes, July 2021

Cyber Bytes, June 2021

Cyber Bytes, June 2021

Cyber Bytes, May 2021

Cyber Bytes, May 2021

Cyber Bytes, April 2021

Cyber Bytes, April 2021

Cyber Bytes, March 2021

Cyber Bytes, March 2021

Cyber Bytes, February 2021

Cyber Bytes, February 2021

Cyber Bytes, January 2021

Cyber Bytes, January 2021

Cyber Bytes, December 2020

Cyber Bytes, December 2020

Cyber Bytes, November 2020

Cyber Bytes, November 2020

Cyber Bytes, October 2020

Cyber Bytes, October 2020

Cyber Bytes, September 2020

Cyber Bytes, September 2020

Cyber Bytes, August 2020

Cyber Bytes, August 2020

Cyber Bytes, July 2020

Cyber Bytes, July 2020

Cyber Bytes, June 2020

Cyber Bytes, June 2020

View more

Release Notes

Release Notes, August 2022

Release Notes, August 2022

Release Notes, July 2022

Release Notes, July 2022

Release Notes, June 2022

Release Notes, June 2022

Release Notes, May 2022

Release Notes, May 2022

Release Notes, April 2022

Release Notes, April 2022

Release Notes, March 2022

Release Notes, March 2022

View more

CSIS Tech Blog

CSIS Tech Blog

CSIS Tech Blog

Peter Kruse - Security Blog

Top 15 cybersikkerhedssøgemaskiner  du skal kende før du dør

Top 15 cybersikkerhedssøgemaskiner du skal kende før du dør

Microsoft udruller "tamper protection" til Defender

Microsoft udruller "tamper protection" til Defender

Sådan kan  Microsoft driver blackliste hjælpe med at beskytte infrastruktur mod avancerede angreb

Sådan kan Microsoft driver blackliste hjælpe med at beskytte infrastruktur mod avancerede angreb

Vildfarne spammails fra "Forsvarsministeriet" var støj

Vildfarne spammails fra "Forsvarsministeriet" var støj

Kritisk sårbarhed i populær open source java software rammer stort antal producenter og leverandører

Kritisk sårbarhed i populær open source java software rammer stort antal producenter og leverandører

Smishing bølge forsøger at fiske NemID koder og passwords

Smishing bølge forsøger at fiske NemID koder og passwords

Supply chain attack on the password manager Clickstudios - PASSWORDSTATE

Supply chain attack on the password manager Clickstudios - PASSWORDSTATE

Apple lapper 0-dags UXSS sårbarhed i flere iDevices

Apple lapper 0-dags UXSS sårbarhed i flere iDevices

Blackhat SEO med it-sikkerhedsoverskifter

Blackhat SEO med it-sikkerhedsoverskifter

Hafnium og aktive angreb mod Microsoft Exchange servere

Hafnium og aktive angreb mod Microsoft Exchange servere

SIE Europe afholder webinar om pDNS og sensor netværk

SIE Europe afholder webinar om pDNS og sensor netværk

Flod af BEC angreb rammer danske advokat firmaer

Flod af BEC angreb rammer danske advokat firmaer

View more

Newsletter

Sign up

Stay informed.
Get our Cyber Bytes!