Don’t miss out!
Abonner og få de nyeste indsigter.
[{"id":1673,"link":"https:\/\/cyberpartners.dk\/saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed\/","name":"saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/09\/pexels-dusan-cvetanovic-254415846-12541596-edited-scaled.jpg","alt":"EU tech er ofte sikker tech."},"title":"S\u00e5dan v\u00e6lger du sikker software fra udlandet!","excerpt":"Valget af softwareleverand\u00f8r kan direkte p\u00e5virke din virksomheds sikkerhedsniveau. For eksempel kan software udviklet af leverand\u00f8rer i lande med mindre strenge cybersikkerhedslovgivninger eller en historie med statsst\u00f8ttede cyberangreb potentielt introducere risici, der ellers ville v\u00e6re frav\u00e6rende i produkter fra mere strengt regulerede jurisdiktioner.","content":"Leverand\u00f8rens oprindelse og sikkerhedsrisici h\u00e6nger sammen N\u00e5r virksomheder v\u00e6lger softwareprodukter, er det ofte funktionaliteten, der f\u00e5r mest opm\u00e6rksomhed. Men trusler fra statsfinansierede hackinggrupper og sofistikerede cyberangreb er stigende, og det er afg\u00f8rende at overveje, hvilken indvirkning leverand\u00f8rens oprindelse","author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"sep 13, 2024","dateGMT":"2024-09-13 07:46:22","modifiedDate":"2024-09-18 12:08:01","modifiedDateGMT":"2024-09-18 12:08:01","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>, <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a> <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyberpartners.dk\/tag\/cyber-partners\/' rel='post_tag'>Cyber Partners<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cybersikkerhed\/' rel='post_tag'>cybersikkerhed<\/a><a href='https:\/\/cyberpartners.dk\/tag\/devsecops\/' rel='post_tag'>DevSecOps<\/a><a href='https:\/\/cyberpartners.dk\/tag\/sikker-software\/' rel='post_tag'>Sikker Software<\/a><a href='https:\/\/cyberpartners.dk\/tag\/software\/' rel='post_tag'>Software<\/a>"},"readTime":{"min":2,"sec":1},"status":"publish"}]
Seneste Indlæg
[{"id":1673,"link":"https:\/\/cyberpartners.dk\/saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed\/","name":"saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/09\/pexels-dusan-cvetanovic-254415846-12541596-edited-scaled.jpg","alt":"EU tech er ofte sikker tech."},"title":"S\u00e5dan v\u00e6lger du sikker software fra udlandet!","excerpt":"Valget af softwareleverand\u00f8r kan direkte p\u00e5virke din virksomheds sikkerhedsniveau. For eksempel kan software udviklet af leverand\u00f8rer i lande med mindre strenge cybersikkerhedslovgivninger eller en historie med statsst\u00f8ttede cyberangreb potentielt introducere risici, der ellers ville v\u00e6re frav\u00e6rende i produkter fra mere strengt regulerede jurisdiktioner.","content":"Leverand\u00f8rens oprindelse og sikkerhedsrisici h\u00e6nger sammen N\u00e5r virksomheder v\u00e6lger softwareprodukter, er det ofte funktionaliteten, der f\u00e5r mest opm\u00e6rksomhed. Men trusler fra statsfinansierede hackinggrupper og sofistikerede cyberangreb er stigende,","author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"sep 13, 2024","dateGMT":"2024-09-13 07:46:22","modifiedDate":"2024-09-18 12:08:01","modifiedDateGMT":"2024-09-18 12:08:01","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>, <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a> <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyberpartners.dk\/tag\/cyber-partners\/' rel='post_tag'>Cyber Partners<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cybersikkerhed\/' rel='post_tag'>cybersikkerhed<\/a><a href='https:\/\/cyberpartners.dk\/tag\/devsecops\/' rel='post_tag'>DevSecOps<\/a><a href='https:\/\/cyberpartners.dk\/tag\/sikker-software\/' rel='post_tag'>Sikker Software<\/a><a href='https:\/\/cyberpartners.dk\/tag\/software\/' rel='post_tag'>Software<\/a>"},"readTime":{"min":2,"sec":1},"status":"publish"},{"id":1288,"link":"https:\/\/cyberpartners.dk\/theladdler\/","name":"theladdler","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/08\/EPOK-CTF-FRA-CYBER-PARTNERS.webp","alt":"EPOK CTF FRA CYBER PARTNERS"},"title":"P\u00f8v at l\u00f8se mini-CTF'en om cybersikkerhed fra The Laddler","excerpt":"Deltag i vores mini-Capture the Flag-udfordring med Cyber Partners. Opdag hemmelighederne bag 'The Laddler' og bevis dine evner indenfor kodebrydning.","content":"DOWNLOAD DEN KRYPTEREDE OPGAVEDownload Hent opgavefilen og l\u00e6r mere om, hvem der st\u00e5r bag The Laddler. Under overfladen hvisker algoritmerne, koderne snyder, og fra en g\u00e5defuld stemme, kendt","author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"aug 6, 2024","dateGMT":"2024-08-06 11:17:47","modifiedDate":"2024-08-05 11:51:58","modifiedDateGMT":"2024-08-05 11:51:58","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyberpartners.dk\/tag\/capture-the-flag\/' rel='post_tag'>Capture the Flag<\/a><a href='https:\/\/cyberpartners.dk\/tag\/ctf\/' rel='post_tag'>CTF<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cyber-partners\/' rel='post_tag'>Cyber Partners<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cybersikkerhed\/' rel='post_tag'>cybersikkerhed<\/a><a href='https:\/\/cyberpartners.dk\/tag\/hacking\/' rel='post_tag'>hacking<\/a><a href='https:\/\/cyberpartners.dk\/tag\/the-laddler\/' rel='post_tag'>The Laddler<\/a><a href='https:\/\/cyberpartners.dk\/tag\/udfordring\/' rel='post_tag'>udfordring<\/a>"},"readTime":{"min":1,"sec":42},"status":"publish"},{"id":574,"link":"https:\/\/cyberpartners.dk\/hvad-er-xss\/","name":"hvad-er-xss","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/06\/pexels-pixabay-159304-1.png","alt":""},"title":"Hvad er XSS (Cross-Site Scripting) Angreb?","excerpt":"","content":"I den digitale verden, hvor sikkerhed er af h\u00f8jeste prioritet, er det vigtigt at forst\u00e5 de forskellige typer angreb, der kan true webapplikationer. Et af de mest almindelige","author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"jun 10, 2024","dateGMT":"2024-06-10 14:01:10","modifiedDate":"2024-07-05 10:20:45","modifiedDateGMT":"2024-07-05 10:20:45","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":50},"status":"publish"},{"id":1184,"link":"https:\/\/cyberpartners.dk\/hvad-er-nis2\/","name":"hvad-er-nis2","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/07\/Instagram-post-7.png","alt":""},"title":"Hvad er NIS2?","excerpt":"","content":"Direktivet om sikkerhed i netv\u00e6rk og informationssystemer (NIS2) er en EU-regulering, der sigter mod at forbedre cybersikkerheden i kritiske infrastruktursektorer s\u00e5som sundhedspleje, bankv\u00e6sen, energi og transport. OES og","author":{"name":"Steffen Lund Andersen","link":"https:\/\/cyberpartners.dk\/author\/steffencyberpartners-dk\/"},"date":"jun 10, 2024","dateGMT":"2024-06-10 07:41:49","modifiedDate":"2024-07-05 13:50:49","modifiedDateGMT":"2024-07-05 13:50:49","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":10},"status":"publish"}]