[{"id":3663,"link":"https:\/\/cyberpartners.dk\/nis2-24-72-30-uden-panik-simpel-rapportering-i-smv\/","name":"nis2-24-72-30-uden-panik-simpel-rapportering-i-smv","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2026\/01\/nis2-24-72-30-response-grid.png","alt":""},"title":"NIS2 24\/72\/30 uden panik: simpel rapportering i SMV","postMeta":[],"author":{"name":"Marius Sangild","link":"https:\/\/cyberpartners.dk\/author\/mariuscyberpartners-dk\/"},"date":"jan 22, 2026","dateGMT":"2026-01-22 17:07:45","modifiedDate":"2026-01-22 17:07:45","modifiedDateGMT":"2026-01-22 17:07:45","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":7},"status":"publish","excerpt":""}]	

Seneste Indlæg

		[{"id":3663,"link":"https:\/\/cyberpartners.dk\/nis2-24-72-30-uden-panik-simpel-rapportering-i-smv\/","name":"nis2-24-72-30-uden-panik-simpel-rapportering-i-smv","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2026\/01\/nis2-24-72-30-response-grid.png","alt":""},"title":"NIS2 24\/72\/30 uden panik: simpel rapportering i SMV","postMeta":[],"author":{"name":"Marius Sangild","link":"https:\/\/cyberpartners.dk\/author\/mariuscyberpartners-dk\/"},"date":"jan 22, 2026","dateGMT":"2026-01-22 17:07:45","modifiedDate":"2026-01-22 17:07:45","modifiedDateGMT":"2026-01-22 17:07:45","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":7},"status":"publish","excerpt":""},{"id":3644,"link":"https:\/\/cyberpartners.dk\/hvor-ofte-boer-din-smv-penteste-tommelfingerregel-og-aarshjul\/","name":"hvor-ofte-boer-din-smv-penteste-tommelfingerregel-og-aarshjul","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2026\/01\/pentest-timeline-abstract.png","alt":""},"title":"Hvor ofte b\u00f8r din SMV penteste? Tommelfingerregel og \u00e5rshjul","postMeta":[],"author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"jan 22, 2026","dateGMT":"2026-01-22 08:16:35","modifiedDate":"2026-01-22 08:25:55","modifiedDateGMT":"2026-01-22 08:25:55","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":11},"status":"publish","excerpt":""},{"id":3615,"link":"https:\/\/cyberpartners.dk\/phishing-smishing-eller-vishing-den-enkle-guide-paa-5-minutter\/","name":"phishing-smishing-eller-vishing-den-enkle-guide-paa-5-minutter","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2026\/01\/digital-deception-clarity.png","alt":""},"title":"Phishing, smishing eller vishing? Den enkle guide p\u00e5 5 minutter","postMeta":[],"author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"jan 13, 2026","dateGMT":"2026-01-13 10:28:08","modifiedDate":"2026-01-13 11:25:21","modifiedDateGMT":"2026-01-13 11:25:21","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":31},"status":"publish","excerpt":""},{"id":1673,"link":"https:\/\/cyberpartners.dk\/saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed\/","name":"saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/09\/pexels-dusan-cvetanovic-254415846-12541596-edited-scaled.jpg","alt":"EU tech er ofte sikker tech."},"title":"S\u00e5dan v\u00e6lger du sikker software fra udlandet!","postMeta":[],"author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"sep 13, 2024","dateGMT":"2024-09-13 07:46:22","modifiedDate":"2024-09-18 12:08:01","modifiedDateGMT":"2024-09-18 12:08:01","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>, <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a> <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyberpartners.dk\/tag\/cyber-partners\/' rel='post_tag'>Cyber Partners<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cybersikkerhed\/' rel='post_tag'>cybersikkerhed<\/a><a href='https:\/\/cyberpartners.dk\/tag\/devsecops\/' rel='post_tag'>DevSecOps<\/a><a href='https:\/\/cyberpartners.dk\/tag\/sikker-software\/' rel='post_tag'>Sikker Software<\/a><a href='https:\/\/cyberpartners.dk\/tag\/software\/' rel='post_tag'>Software<\/a>"},"readTime":{"min":2,"sec":1},"status":"publish","excerpt":"Valget af softwareleverand\u00f8r kan direkte p\u00e5virke din virksomheds sikkerhedsniveau. For eksempel kan software udviklet af leverand\u00f8rer i lande med mindre strenge cybersikkerhedslovgivninger eller en historie med statsst\u00f8ttede cyberangreb potentielt introducere risici, der ellers ville v\u00e6re frav\u00e6rende i produkter fra mere strengt regulerede jurisdiktioner."},{"id":1288,"link":"https:\/\/cyberpartners.dk\/theladdler\/","name":"theladdler","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/08\/EPOK-CTF-FRA-CYBER-PARTNERS.webp","alt":"EPOK CTF FRA CYBER PARTNERS"},"title":"P\u00f8v at l\u00f8se mini-CTF'en om cybersikkerhed fra The Laddler","postMeta":[],"author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"aug 6, 2024","dateGMT":"2024-08-06 11:17:47","modifiedDate":"2024-08-05 11:51:58","modifiedDateGMT":"2024-08-05 11:51:58","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyberpartners.dk\/tag\/capture-the-flag\/' rel='post_tag'>Capture the Flag<\/a><a href='https:\/\/cyberpartners.dk\/tag\/ctf\/' rel='post_tag'>CTF<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cyber-partners\/' rel='post_tag'>Cyber Partners<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cybersikkerhed\/' rel='post_tag'>cybersikkerhed<\/a><a href='https:\/\/cyberpartners.dk\/tag\/hacking\/' rel='post_tag'>hacking<\/a><a href='https:\/\/cyberpartners.dk\/tag\/the-laddler\/' rel='post_tag'>The Laddler<\/a><a href='https:\/\/cyberpartners.dk\/tag\/udfordring\/' rel='post_tag'>udfordring<\/a>"},"readTime":{"min":1,"sec":42},"status":"publish","excerpt":"Deltag i vores mini-Capture the Flag-udfordring med Cyber Partners. Opdag hemmelighederne bag 'The Laddler' og bevis dine evner indenfor kodebrydning."},{"id":574,"link":"https:\/\/cyberpartners.dk\/hvad-er-xss\/","name":"hvad-er-xss","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/06\/pexels-pixabay-159304-1.png","alt":""},"title":"Hvad er XSS (Cross-Site Scripting) Angreb?","postMeta":[],"author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"jun 10, 2024","dateGMT":"2024-06-10 14:01:10","modifiedDate":"2024-07-05 10:20:45","modifiedDateGMT":"2024-07-05 10:20:45","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":50},"status":"publish","excerpt":""},{"id":1184,"link":"https:\/\/cyberpartners.dk\/hvad-er-nis2\/","name":"hvad-er-nis2","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/07\/Instagram-post-7.png","alt":""},"title":"Hvad er NIS2?","postMeta":[],"author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"jun 10, 2024","dateGMT":"2024-06-10 07:41:49","modifiedDate":"2024-07-05 13:50:49","modifiedDateGMT":"2024-07-05 13:50:49","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":10},"status":"publish","excerpt":""}]