Blog

 
Latest blog post
03.03.2022

Cybersecurity as part of defense measures against modern war fighting capabilities

CYBERS in cooperation with Recorded Future will share insights on the ongoing cyber crisis which started several months before the military invasion. This article provides an overview of the current situation, as well as the recommended emergency actions that should be taken by organizations to withstand this cyber conflict.

Keep reading
Latest event
19.09.2022

CISSP training and certification 19.09-23.09.2022

The CISSP is ideal for information security professionals seeking to prove their understanding of cybersecurity strategy and hands-on implementation. It shows you have the advanced knowledge and technical skills to design, develop and manage an organization’s overall security posture.

View details
20.01.2022

Testing and identifying the value of your next cybersecurity solution

The security world is changing rapidly and we are slowly reaching another huge milestone. Not a very happy one though: manual security operations are no longer sufficient. This is a little bit painful to admit but the fact remains: if you rely on the manual labour of CTOs, CISOs and their teams to react to an incident, then you are in for a very rude awakening.

Keep reading
27.12.2021

Are you at risk from the security vulnerability found in the Java-based Apache Log4j logging feature?

A security hole was discovered in the Java-based Log4j logging feature, affecting millions of businesses, government agencies, and cloud services using this popular Apache library. Are you at risk?

Keep reading
29.10.2021

What are Vulnerability Assessment, Penetration Testing and Red Teaming?

People do not understand the difference between a Red Team Assessment, a Penetration Testing, and a Vulnerability Assessment. You need to understand what are Your goals and then choose the best suitable assessment. What are differences? Let’s find out!

Keep reading
12.10.2021

API Enumeration with Kite Runner

Heavy portion of interaction with modern web applications is done through APIs. And while there existed numerous tools for conventional web application enumeration, none were designed to target APIs specifically, until Assetnote release KiteRunner.

Keep reading
05.10.2021

CYBERS brings IoT security to RigaComm IoT conference

Conclusion about Nordic-Baltic Security Summit 2021 – The No 1 cyber security event and meeting of minds for the Nordic-Baltic region.

Keep reading
04.10.2021

Conference Summary: Nordic-Baltic Security Summit 2021

Conclusion about Nordic-Baltic Security Summit 2021 – The No 1 cyber security event and meeting of minds for the Nordic-Baltic region.

Keep reading