Blog

 

Posts marked with "cybers"

03.06.2024

Major milestone in cybersecurity: CYBERS integrated into NEVERHACK’s ecosystem

Press release: CYBERS joins NEVERHACK SAS, a leading European cybersecurity group, to enhance its market position, expand reach, and offer added value to its clients.

Keep reading
07.12.2023

Exploring the Data Frontier: A Dive into Elastic Technology

In a recent KüberCAST episode, we delve into intriguing topics surrounding future trends and the impact of technology on our daily lives. Big data, datalakes, Elastic and how to make sence regarding the Data Universe!

Keep reading
23.11.2023

The road of security automation. Join us!

In a recent KüberCAST episode, we had the pleasure of hosting Fredrik Ødegårdstuen from Shuffler.io, a seasoned expert in security automation and SOAR (Security Orchestration, Automation, and Response). We’ll explore the security automation, and why it’s becoming an integral part of the cybersecurity landscape.

Keep reading
08.11.2023

Will Next Generation Firewalls have feelings? Injecting AI to Firewalls – monsters or angels?

In a rapidly evolving world of technology, cybersecurity is at the forefront of innovation. On a recent episode of KüberCAST, Marko Haarala from Cisco shares insights into how the future of cybersecurity is being shaped by the integration of artificial intelligence (AI) and language interfaces.

Keep reading
24.10.2023

Roles and responsibilities in information security management – the role of a CISO

The role of a CISO is not only technical but also strategic, requiring a deep understanding of the company’s risks and business processes.

Keep reading
09.10.2023

Navigating the Invisible Peril: Understanding and Managing Cyber Risks

Cyber risk is a paradoxical menace, lurking in the digital shadows. It lacks the tangible qualities that make other risks easily identifiable. You can’t touch it, taste it, smell it, or even see it coming until it’s too late. It thrives in the vast and intricate web of digital systems, where it can remain hidden until a breach occurs. But despite its elusive nature, it’s a risk that no business can afford to ignore.

Keep reading