<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us
search
close

Cybersprint 5-year anniversary

by Cybersprint Blog 30 Oct 2020

2020 marks our five-year anniversary! To celebrate, we have published five video interviews about our journey so far. 

It was five years ago that Pieter Jansen decided to start his own company. Moving forward with script and code he had already developed, automating cybersecurity from the get go. Over the years, more people joined, more clients signed, and many more lines of code were written.

But how did it all start? And what has changed since? In this video series, we interview people from different parts of the organisation. They share their perspectives of the company's growth, as well as how their own roles evolved. 

Watch the promo

 

 

 

 

 

 

1. Origin story - Pieter Jansen

We start with the origin story. What made Pieter decide to found Cybersprint? And where does the name come from? This is his story. 

 

 

 

 

 

 

2. Human Resourcefulness - Natalie Zorko

Watch how Natalie describes her role as the link between teams.


3. Disruptive development - Jordy Schaatsbergen & Steven ketelaar

Jordy and Steven are two of the very first developers to have joined the company. What made their work easier four years ago, and what have they learnt since then? 

 

 

 

 

 

 

 

 

 

 

4. Investing in ideas - Liduina hammer

Start-ups need a little help in the first stages. Liduina, Head of Investments at InnovationQuarter, talks about what made them believe in Cybersprint. 

 

 

 

 

 

 

 

 

 


5. Future-proof footprints - Eward Driehuis

Eward, our SVP Strategy, talks about why he wanted to be a part of the Cybersprint team. How did his vision and passion for cybersecurity help the company focus on what we do like no one else does?

 

 

Forwarding your call: How do DNS and CNAME records work?

The web is in a continuous state of dynamic development, with websites being created, updated, and deleted every day. These websites are the digital equivalent of a rented property. Similar to physical properties, visitors will need a precise address to visit you.

read more

Digital Footprint explained: What is it & where does it come from?

It's the term we use the most: Digital Footprint. It is the foundation of your organisation’s digital infrastructure. It’s the starting point of your IT security policies, configuration database management, vulnerability mitigation, and much more. In this blog, we’ll shortly describe what drives the need for a Digital Footprint solution, share our definition of the term, and explain how it minimises the risks to your brand.

read more

Swagger API: Discovery of API data and security flaws

APIs (Application Programming Interface) are used by applications to communicate and interact between systems, access data, and much more. It makes sure you get the correct response on a request. However, if someone were to intercept this request-response, they could potentially misuse the data or alter the process. Cyber-criminals scan the internet for unsecured APIs on a daily basis. If not properly secured, this can lead to unauthorised access to internal data or customer information. What’s more, in some cases it allows tampering with data directly from an exposed API. This technical article focuses on mapping and discovering Swagger APIs throughout the EU. We will present how we discovered those APIs and checked for misconfigured examples. We will illustrate each step using screenshots, present the results, and provide defensive recommendations. Research conducted by Soufian El Yadmani, Security Analyst at Cybersprint The interactive map below shows how many Swagger APIs we found, and in which region. You can click, drag and zoom to see how many Swagger APIs were found in your area.    

read more

Do you have a question?

Our experts have the answers

Contact us