Don’t miss out!
Abonner og få de nyeste indsigter.
[{"id":1673,"link":"https:\/\/cyberpartners.dk\/saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed\/","name":"saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/09\/pexels-dusan-cvetanovic-254415846-12541596-edited-scaled.jpg","alt":"EU tech er ofte sikker tech."},"title":"S\u00e5dan v\u00e6lger du sikker software fra udlandet!","author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"sep 13, 2024","dateGMT":"2024-09-13 07:46:22","modifiedDate":"2024-09-18 12:08:01","modifiedDateGMT":"2024-09-18 12:08:01","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>, <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a> <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyberpartners.dk\/tag\/cyber-partners\/' rel='post_tag'>Cyber Partners<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cybersikkerhed\/' rel='post_tag'>cybersikkerhed<\/a><a href='https:\/\/cyberpartners.dk\/tag\/devsecops\/' rel='post_tag'>DevSecOps<\/a><a href='https:\/\/cyberpartners.dk\/tag\/sikker-software\/' rel='post_tag'>Sikker Software<\/a><a href='https:\/\/cyberpartners.dk\/tag\/software\/' rel='post_tag'>Software<\/a>"},"readTime":{"min":2,"sec":1},"status":"publish","excerpt":"Valget af softwareleverand\u00f8r kan direkte p\u00e5virke din virksomheds sikkerhedsniveau. For eksempel kan software udviklet af leverand\u00f8rer i lande med mindre strenge cybersikkerhedslovgivninger eller en historie med statsst\u00f8ttede cyberangreb potentielt introducere risici, der ellers ville v\u00e6re frav\u00e6rende i produkter fra mere strengt regulerede jurisdiktioner."}]
Seneste Indlæg
[{"id":1673,"link":"https:\/\/cyberpartners.dk\/saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed\/","name":"saadan-vaelger-du-software-med-fokus-paa-cybersikkerhed","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/09\/pexels-dusan-cvetanovic-254415846-12541596-edited-scaled.jpg","alt":"EU tech er ofte sikker tech."},"title":"S\u00e5dan v\u00e6lger du sikker software fra udlandet!","author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"sep 13, 2024","dateGMT":"2024-09-13 07:46:22","modifiedDate":"2024-09-18 12:08:01","modifiedDateGMT":"2024-09-18 12:08:01","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>, <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a> <a href=\"https:\/\/cyberpartners.dk\/category\/news\/\" rel=\"category tag\">News<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyberpartners.dk\/tag\/cyber-partners\/' rel='post_tag'>Cyber Partners<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cybersikkerhed\/' rel='post_tag'>cybersikkerhed<\/a><a href='https:\/\/cyberpartners.dk\/tag\/devsecops\/' rel='post_tag'>DevSecOps<\/a><a href='https:\/\/cyberpartners.dk\/tag\/sikker-software\/' rel='post_tag'>Sikker Software<\/a><a href='https:\/\/cyberpartners.dk\/tag\/software\/' rel='post_tag'>Software<\/a>"},"readTime":{"min":2,"sec":1},"status":"publish","excerpt":"Valget af softwareleverand\u00f8r kan direkte p\u00e5virke din virksomheds sikkerhedsniveau. For eksempel kan software udviklet af leverand\u00f8rer i lande med mindre strenge cybersikkerhedslovgivninger eller en historie med statsst\u00f8ttede cyberangreb potentielt introducere risici, der ellers ville v\u00e6re frav\u00e6rende i produkter fra mere strengt regulerede jurisdiktioner."},{"id":1288,"link":"https:\/\/cyberpartners.dk\/theladdler\/","name":"theladdler","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/08\/EPOK-CTF-FRA-CYBER-PARTNERS.webp","alt":"EPOK CTF FRA CYBER PARTNERS"},"title":"P\u00f8v at l\u00f8se mini-CTF'en om cybersikkerhed fra The Laddler","author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"aug 6, 2024","dateGMT":"2024-08-06 11:17:47","modifiedDate":"2024-08-05 11:51:58","modifiedDateGMT":"2024-08-05 11:51:58","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cyberpartners.dk\/tag\/capture-the-flag\/' rel='post_tag'>Capture the Flag<\/a><a href='https:\/\/cyberpartners.dk\/tag\/ctf\/' rel='post_tag'>CTF<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cyber-partners\/' rel='post_tag'>Cyber Partners<\/a><a href='https:\/\/cyberpartners.dk\/tag\/cybersikkerhed\/' rel='post_tag'>cybersikkerhed<\/a><a href='https:\/\/cyberpartners.dk\/tag\/hacking\/' rel='post_tag'>hacking<\/a><a href='https:\/\/cyberpartners.dk\/tag\/the-laddler\/' rel='post_tag'>The Laddler<\/a><a href='https:\/\/cyberpartners.dk\/tag\/udfordring\/' rel='post_tag'>udfordring<\/a>"},"readTime":{"min":1,"sec":42},"status":"publish","excerpt":"Deltag i vores mini-Capture the Flag-udfordring med Cyber Partners. Opdag hemmelighederne bag 'The Laddler' og bevis dine evner indenfor kodebrydning."},{"id":574,"link":"https:\/\/cyberpartners.dk\/hvad-er-xss\/","name":"hvad-er-xss","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/06\/pexels-pixabay-159304-1.png","alt":""},"title":"Hvad er XSS (Cross-Site Scripting) Angreb?","author":{"name":"Alan M. Kristensen","link":"https:\/\/cyberpartners.dk\/author\/alancyberpartners-dk\/"},"date":"jun 10, 2024","dateGMT":"2024-06-10 14:01:10","modifiedDate":"2024-07-05 10:20:45","modifiedDateGMT":"2024-07-05 10:20:45","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":50},"status":"publish","excerpt":""},{"id":1184,"link":"https:\/\/cyberpartners.dk\/hvad-er-nis2\/","name":"hvad-er-nis2","thumbnail":{"url":"https:\/\/cyberpartners.dk\/wp-content\/uploads\/2024\/07\/Instagram-post-7.png","alt":""},"title":"Hvad er NIS2?","author":{"name":"Steffen Lund Andersen","link":"https:\/\/cyberpartners.dk\/author\/steffencyberpartners-dk\/"},"date":"jun 10, 2024","dateGMT":"2024-06-10 07:41:49","modifiedDate":"2024-07-05 13:50:49","modifiedDateGMT":"2024-07-05 13:50:49","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>","space":"<a href=\"https:\/\/cyberpartners.dk\/category\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":10},"status":"publish","excerpt":""}]