www.mnemonic.io
Open in
urlscan Pro
104.22.30.197
Public Scan
Submitted URL: http://mnemonic.se/
Effective URL: https://www.mnemonic.io/
Submission: On August 14 via api from US — Scanned from SE
Effective URL: https://www.mnemonic.io/
Submission: On August 14 via api from US — Scanned from SE
Form analysis
0 forms found in the DOMText Content
Skip to content To Start Page * Report an incident * Log in * Choose language * Search * Solutions * Insights * Company * Careers * Toggle navigation REMOVING THE GUESSWORK FROM CYBERSECURITY * Our approach * Get in touch OUR SERVICES * MANAGED DETECTION & RESPONSE Security experts in our SOC monitor, detect and respond to threats targeting your business - 24/7 Learn more about "Managed Detection & Response" * THREAT INTELLIGENCE Stay ahead of your adversaries with up-to-date, timely and actionable intelligence and tools Learn more about "Threat Intelligence" * INCIDENT RESPONSE Investigate and remediate cyber incidents with Europe's leading response team Learn more about "Incident Response" * ASSESSMENTS & TESTING Proactively uncover risks and vulnerabilities in your digital environment Learn more about "Assessments & Testing" * CONSULTING Expert advice when you need it to help plan, build and maintain a robust security program Learn more about "Consulting" * SECURITY PRODUCTS Strategic partnerships to supply, support and deliver managed services on industry-leading security solutions Learn more about "Security Products" Blog ARE WE MISSING THE ROLE OF CHIEF INTELLIGENCE OFFICER (CINO) IN MANAGEMENT? How can a new Chief Intelligence Officer (CINO) role improve the quality of decisions in management teams? In this blog post, mnemonic's Trond Skjerve discusses how companies actually use intelligence for strategic decisions, and if a central intelligence function close to management can provide a competitive advantages. Read full blog post IT OUTAGES RELATED TO CROWDSTRIKE FALCON IT systems globally are impacted by an operational incident involving a faulty update in CrowdStrike’s Falcon Platform. Read more ADVISORY: ACTIVE EXPLOITATION OF CHECK POINT REMOTE ACCESS VPN VULNERABILITY A critical vulnerability (CVE-2024-24919) has been discovered in Check Point Security Gateways with Remote Access VPN enabled, also referred to as the "Mobile Access" blade. The vulnerability also applies to instances where Check Point Mobile Secure Workspace with Capsule is used. Read the full advisory TRUSTED BY * BLOG * PODCAST * SECURITY REPORTS * ON-DEMAND WEBINARS We use cookies to secure and enhance your website experience. Strictly necessary cookies are required for the site to function, while performance cookies are used for anonymous usage analytics. Find more information in our cookie notice. Accept all cookies Strictly necessary GET IN TOUCH * +47 23 20 47 00 * contact@mnemonic.io * Contact us * SE: +46 8 444 8990 * DK: +45 51 92 65 78 * NL: +31 30 899 40 19 * UK: +44 203 973 0036 * US: +1 650 241 4550 OUR OFFICES * Oslo (HQ) * Stavanger * Trondheim * Stockholm * Copenhagen * Utrecht * London * Palo Alto INSIGHTS * Podcast * Events & Webinars * Blog * News * Security Reports RECEIVE UPDATES ON SECURITY THREATS AND UPCOMING SEMINARS Subscribe FOLLOW US IN OTHER CHANNELS * Facebook * Github * Twitter * YouTube * mnemonic security podcast * LinkedIn Copyright © 2024 mnemonic AS. All rights reserved * Privacy Notice * Code of Conduct * Cookie Notice * Sales Terms & Conditions * Sustainability