The information on this page is intended for journalists, press and media. Click YES to get to the newsroom. If you click NO you will come back to Mynewsdesk.com.
"Dare to start from scratch and dive into algorithms, data structures, discrete mathematics, the variety of programming languages, or into whatever makes your heart pound faster", says J. Rika Pydde, Junior Consultant, from NNIT. Read the full article here.
Do you see a need for security protection in regards to protect your business from financial and reputational damage? Read Helge Skov Diernæs, CISM certified security professional from NNIT A/S's column about the subject here: http://bit.ly/2lYkk4J
Cyber threats become increasingly sophisticated intensifying the need for more advanced responses http://bit.ly/2lFOqcu
Fantastic read from real life: ''Suddenly the plans were all history'' by Johann Gautier, Gung Ho, Vice President for Management Consulting in NNIT.
Nobody wants to pay 4% of their turnover in fines, so companies and authorities are finding smart ways to comply with the new regulations on personal data. Identity and Access Management is key to staying in control.
SAP has introduced the API Business Hub, which exposes SAP processes and data as APIs.
Hackers can easily exploit known vulnerabilities, says Artur Ganc, Principal Consultant in NNIT A/S. Get his 10 steps to successful patch management framework here: http://bit.ly/2evEu2f
Data Access Governance requires careful consideration, be balanced to business needs, and needs to be based on how important it is to keep your sensitive data secure. Happy to announce yet another Security Insight blog post. Today published by Johan Holkmann Jacobsen, Identity & Access Management Senior Consultant in NNIT A7S. Read more here.
Be aware of the RAT's - a deep dive into the area of Remote Administration Tools (RATs) by John Clayton, IT Management Consultant and Cyber Security Specialist in NNIT: http://bit.ly/2caislG
Many companies worry about security and privacy when migrating to cloud services. Read more here: http://bit.ly/2aNYxtT
This could be the golden age of computer hacking and Cybercrime.
Yes, we need protection, all of us! Good read from John Clayton, Cyber Security Specialist, in NNIT A/S. Read the full article here.
When you choose to create a user account and follow a newsroom your personal data will be used by us and the owner of the newsroom, for you to receive news and updates according to your subscription settings.
To learn more about this, please read our Privacy Policy, which applies to our use of your personal data, and our Privacy Policy for Contacts, which applies to the use of your personal data by the owner of the newsroom you follow.
Please note that our Terms of Use apply to all use of our services.
You can withdraw your consent at any time by unsubscribing or deleting your account.
Email sent to __email__. Click the link there to follow NNIT News.