Cyber Security & Digital Forensics.

Investigations, incident response,cloud and email security reviews by a Gothenburg-based expert with decades of hands-on experience. Pragmatic, precise, and discreet.

Incident Response Digital Forensics Malware Analysis Cloud Security Email Security DNS Audit logging PKI/Encryption

What we typically help with

  • Intrusion & data theft investigations
  • Ransomware triage & evidence preservation
  • Insider misuse & fraud cases
  • Hard drive and Memory Forensics
  • Cloud posture reviews (Azure & AWS)
  • Email Security configuration assessment
  • Implement and verification of email security frameworks

Selected Experience

Work across finance, medical, manufacturing, real estate, automotive, and academia.

Ready to harden your environment or investigate an incident?

Let’s define a scope and timeline.

Start a conversation

Core Services

Clear scopes, fast onboarding, and defensible outcomes.

Digital Forensics & Incident Response

Evidence-driven investigations for Windows, Linux, cloud and SaaS sources.

  • Hard drive & memory forensics.
  • Timeline, triage & artifacts.
  • Chain-of-custody & reporting.

Learn more

Email Security Assessment

Spam and Anti-Malware filtering,Phishing Protection, and general vendor best practices.

  • Audit of Secure Email gateway configuration.
  • Encryption, logging & monitoring.
  • Implement and verify Security Frameworks, SPF, DKIM ,DMARC, TLS and BIMI.

Learn more

Cloud Security Assessment

Azure & AWS posture reviews mapped to CIS, NIST, and vendor best practices.

  • Identity & access (MFA, roles, keys).
  • Network segmentation & egress.
  • Encryption, logging & monitoring.
  • SIEM setup and monitoring.

Learn more

Digital Forensics & Incident Response

dfir

Digital forensics and incident response require precision, consistency, and defensibility. Our process is fully repeatable, leverages validated tools, and prioritizes clear, actionable communication to all stakeholders — from executives to legal teams.

  • Evidence Acquisition – We collect data from diverse sources (dead/live systems, cloud platforms such as M365, log repositories) using forensically sound methods to preserve integrity and maintain chain of custody.
  • In-Depth Analysis – Our investigators build timelines, correlate artifacts, and perform malware triage to uncover root cause, impact, and attacker behaviour.
  • Hard Drive & Memory Forensics – We extract and analyse disk images and volatile memory to identify persistence mechanisms, malicious code, and attacker activity.
  • Clear, Structured Reporting – Findings communicated through executive summaries for leadership and detailed technical annexes for security teams and legal review, ensuring the results are understandable and defensible in court if required.

DFIR Deliverables

The result should support both immediate response efforts and long-term security improvements.

  • Acquisition Plan & Evidence Log
    • A detailed collection strategy with full chain-of-custody documentation, ensuring that all evidence is legally defensible and reproducible.
  • Timeline & Indicators of Compromise
    • (IOCs) – A reconstructed timeline of events paired with extracted IOCs to accelerate detection, threat hunting, and potential law enforcement engagement.
  • Root-Cause & Impact Analysis
    • Clear identification of how the incident occurred, which systems and data was affected, and the scope of exposure to support risk and compliance assessments.
  • Remediation Recommendations
    • Practical, prioritized steps for containment, eradication, and long-term hardening to reduce the likelihood of recurrence.

Request a forensics engagement

Email Security assessment

dfir

A robust email security strategy and configuration reduce the risk of phishing, malware delivery, and business email compromise (BEC) by combining assessment, configuration, and continuous validation against industry standards. It is important to understand that email configuration directly impacts the level of trust in your brand’s domain. Properly configured security frameworks protect not only your organization but also anyone receiving emails that appear to come from your domains—including those not sent through your official email gateway.

  • Assessment of Email Security Configuration – Comprehensive review of mail gateways, spam filters, anti-malware engines, and phishing protection controls to ensure optimal coverage and minimal false positives.
  • Encryption, Logging & Monitoring – Verification that end-to-end encryption (TLS, S/MIME), message tracing, and security event logging are in place to support detection, response, and compliance requirements.
  • Implementation & Verification of Security Frameworks – Deployment and validation of key email authentication and transport standards, including:
    • SPF – Prevent spoofing by validating sender IPs.
    • DKIM – Ensure message integrity via cryptographic signatures.
    • DMARC – Define policy for handling authentication failures.
    • TLS-STS / MTA-STS – Enforce encrypted transport for mail servers.
    • TLS-RPT – Enable reporting of mail transport issues.
    • BIMI – Visually authenticate legitimate senders with brand logos.
    • DANE – DNS-based Authentication of Named Entities.
  • Continuous Improvement & Vendor Best Practices – Alignment with evolving security frameworks, vendor recommendations, and threat intelligence feeds to stay ahead of new attack techniques.

Email Deliverables

  • Assessment of Current Email Security Posture.
    • Mail gateways and routing configuration.
    • Spam filtering and phishing detection controls.
    • Anti-malware engines and sandboxing solutions.
    • Identify misconfigurations, coverage gaps, and sources of false positives/negatives.
    • Deliver assessment report with prioritized remediation recommendations.
  • Encryption, Logging & Monitoring Validation.
    • Verify enforcement of TLS for inbound and outbound mail.
    • Confirm support for advanced encryption (S/MIME, PGP where applicable).
    • Review message tracing and logging capabilities across mail flow.
    • Validate integration with SIEM/SOC for detection and incident response.
    • Provide recommendations for compliance and audit readiness.
  • Security Frameworks Implementation & Validation.
    • SPF – Prevent spoofing by validating sender IPs.
    • DKIM – Ensure message integrity with cryptographic signatures.
    • DMARC – Define policies for failed authentication.
    • MTA-STS / TLS-STS – Enforce encrypted mail transport (gateway to gateway).
    • TLS-RPT – Enable reporting of transport issues.
    • BIMI – Build trust with visual brand indicators.
    • DANE – Strengthen email authentication with DNS-based security.
  • Continuous Improvement & Best Practice Alignment.
    • Establish ongoing validation of email security posture against industry standards (e.g., vendor guidance).
    • Monitor adoption of evolving frameworks and protocol updates.
    • Incorporate vendor-specific recommendations (Microsoft, Apple, Google, etc.).
    • Integrate threat intelligence feeds to anticipate and counter new attack techniques.
    • Provide roadmap for long-term improvements and governance.

Book an assessment

Cloud Security Assessment

dfir

Our cloud security assessment identifies risks, prioritizes them based on likelihood and impact, and provides practical recommendations aligned with your organization’s risk tolerance and compliance obligations. Findings are framed in business context so that decision-makers can weigh security improvements against operational and strategic priorities.

  • Identity & Access Management - We evaluate how identities (human and service) are managed, focusing on least privilege enforcement, MFA coverage, conditional access policies, credential lifecycle management (e.g., key and secret rotation), and federation with enterprise identity providers. Weaknesses here often represent the most direct path for attackers.
  • Networking & Connectivity - Assessment covers network segmentation, use of private endpoints, control of outbound (egress) traffic, and exposure of management interfaces. We examine whether architectural patterns reduce the blast radius of compromise and prevent unnecessary internet reachability.
  • Data Protection - We assess encryption controls (at rest, in transit, and in use where applicable), backup and recovery readiness, secrets and certificate management practices, and the handling of sensitive data across environments. This ensures resilience against data breaches, ransomware, and regulatory non-compliance.
  • Logging, Monitoring & Detection - We review cloud-native telemetry, retention settings, centralization of logs, and the integration of detection rules with your SOC/monitoring stack. The goal is to ensure that anomalous or malicious activities can be identified quickly and with sufficient context for response.
  • Cloud-Native Security Services - We assess how well vendor-specific security services (e.g., AWS Security Hub, Azure Defender/Sentinel) are deployed, tuned, and embedded into operational processes. Misconfiguration or under-utilization of these tools often leaves organizations with “shelfware” rather than real protection.

Cloud Deliverables

  • Identity & Access Management
    • Review privilege enforcement, MFA, conditional access, credential lifecycle, and federation with enterprise identity.
    • Identify weaknesses as key attack vectors.
  • Networking & Connectivity
    • Assess segmentation, private endpoints, egress controls, and management interface exposure.
    • Recommend designs that limit blast radius and unnecessary internet reachability.
  • Data Protection
    • Evaluate encryption (at rest, in transit, in use), key/secret management, backup readiness, and sensitive data handling.
    • Highlight compliance and resilience gaps.
  • Logging & Monitoring
    • Review telemetry coverage, log retention/centralization, and SOC/SIEM integration.
    • Assess detection rule effectiveness and response workflows.
  • Cloud-Native Security Services
    • Evaluate use of AWS/Azure security tools, ensuring proper configuration, tuning, and integration into operations.
    • Eliminate “shelfware.”
    • Reporting & Roadmap
      • Deliver risk-ranked findings, practical recommendations, and a prioritized roadmap aligned with compliance and business context.

    Book an assessment

About Nansec

Niklas Andersson

Since 1994, I’ve lived and breathed IT—shifting my focus to security in 1998. In 2018, I founded Nansec to share what I’ve learned from decades of hands-on work with infrastructure, operating systems, and cloud platforms. My experience leading Incident Response and Digital Forensics across industries has taught me that security isn’t just about tools—it’s about protecting people and enabling trust. That’s what I bring to every project.

Based in Gothenburg, Sweden.

Keep engagements small, focused, and confidential.

Contact

contact

Prefer email with your scope, timelines, and any confidentiality requirements.

We support Signal, S/MIME and PGP.

Direct contact

Email: niklas.andersson@nansec.se

Phone: +46 707 92 04 05

Location: Gothenburg, Sweden

Organisation number: 559166-4411


S/MIME Certificate: Link


PGP Key ID: 3D2C2F789D3590342F83C9AF31BB76B1C60CAF62 Link