BLOG
Cyver Updates
Follow Cyver for the latest industry updates, case studies, new features, and more.
Bringing Pentests into Internal Vulnerability Management Processes for Better Cybersecurity
Most modern organizations have some form of vulnerability management in place. Systems made up of scanners, automated monitoring, firewalls, and proactive next steps in which vulnerabilities are identified, their root cause found, and fixes worked into upcoming...
Should You Outsource Pentesting: Third Party vs In-House Pentesting
Penetration testing has traditionally been formed by external or third-party consultants. Increasingly, organizations are moving those teams in-house, hiring and training ethical hackers to perform regular pentesting on in-house environments. That’s often crucial for...
Cyver Pentest: When is Pentesting Most Effective
Most organizations are aware that penetration testing is an important part of cybersecurity. Whether you have to pass certifications, meet regulatory requirements, or stay compliant with PCI DSS or other standards, you need pentesting. Increasingly, organizations are...
How Often Should You Pentest?
Pentesting should be performed on a regular basis, with results feeding into development, bug fixes, and IT teams updating security and settings. But, how often should you be pentesting? And, does that change from asset to asset? Or should you be testing every...
Getting Started with Pentest-as-a-Service
Pentest-as-a-Service is the concept of contracting repeat pentests, across the same assets, and managing vulnerabilities long-term, with the intent of hardening the environment. Normally, this means integrating that testing into development, cybersecurity policy, and...
Meet our Pentesters: Mike Terhaar
Cyver relies on a network of skilled professional pentesters to meet the needs of our clients. Mike Terhaar is our lead pentester and he’s been involved with cybersecurity since the early days of the world wide web. Since then, he’s joined and led pentesting teams and...