Contact us
Request demo →
Contact us
search
close

Cybersprint

Recent Posts

International Women's Day 2022

As today is International Women’s Day, we would like to celebrate the women that work across all departments at Cybersprint. We would like to introduce some of them to you:

read more

When paths merge

When I founded Cybersprint in 2015, I had the vision of bringing security technology from terminals to the boardroom – cybersecurity needed to be elevated to allow management to make the right decisions supported by holistic insights.

read more

The state of API security: global research comparison

Previously, we reported on the security state of Swagger APIs all throughout Europe. After the EU region, we conducted the same investigation for North America and for the APAC region. This report will make comparisons between the API security levels in the three regions. What differences and similarities can we discern? IS API security a global issue?

read more

Defend yourself against a coming wave of API cyberattacks

APIs (Application Programming Interfaces) are used by countless businesses. By defining the rules that programmers must follow to interact with a programming language or software tool, they play a key role in enabling organisations to connect with services and transfer data.

read more

Log4j vulnerability: the timeline & security recommendations

Last Thursday, a critical vulnerability in Apache log4j was published. Log4j is a software component, meaning that it integrates with a lot of Java applications: it is their most commonly used logging framework. It’s used in thousands of different applications, leading to systems at risk on a largely unprecedented scale.

read more

Open directories: our research findings

In our previous blogs to this open directory series, we talked about what open directories are and why they pose a risk, and how we set up our own research into the extent of the issue. That also featured a sneak peek into the results. Now that we have presented the findings in our webinar, this article will cover the statistics and most striking examples. And most importantly: what are our conclusions and tips to make your own directories data leak free?

read more

Diving into the cookie jar: why cookies are used and how to set them

Cookie settings, cookie banners, cookie consent… You are asked to review and agree with a website’s cookie settings whenever you visit it for the first time. Some of that data is necessary or anonymous, some is not. And it’s not always easy to set up and manage, as we’ve recently experienced ourselves. This blog aims to clarify the different cookie settings and regulations, hopefully helping you to tackle similar challenges. What exactly do you need to keep in mind when managing your website’s cookie settings?

read more

Attack surface in numbers: Which market faces the highest risks?

The need for cybersecurity is shared by organisations in all markets. Every business has valuable data to protect and operations to maintain. Yet, no organisation is completely risk-free - that is impossible to achieve anyway. Luckily, they don’t have to be. Not all risks have the same potential impact. Some are accepted and need no further action, while others need to be prioritised. It’s these high-risk assets that need attention.

read more

Controlling Risks at the Municipality of The Hague

The Hague is the administrative and political capital of the Netherlands. International city of peace, justice and security. As far as the latter is concerned, it is not just about physical safety, but increasingly also about digital safety or cyber security. The municipality of The Hague has high ambitions when it comes to cyber security and improving digital services. The desire to digitise is inextricably linked to cyber security: the more processes go digital, the more important it is to ensure they are secure.

read more

Do you have a question?

Our experts have the answers

Contact us