BLOG

Cyver Updates

Follow Cyver for the latest industry updates, case studies, new features, and more.

Cyver Pentest: When is Pentesting Most Effective

Cyver Pentest: When is Pentesting Most Effective

Most organizations are aware that penetration testing is an important part of cybersecurity. Whether you have to pass certifications, meet regulatory requirements, or stay compliant with PCI DSS or other standards, you need pentesting. Increasingly, organizations are...

How Often Should You Pentest? 

How Often Should You Pentest? 

Pentesting should be performed on a regular basis, with results feeding into development, bug fixes, and IT teams updating security and settings.  But, how often should you be pentesting? And, does that change from asset to asset? Or should you be testing every...

Getting Started with Pentest-as-a-Service 

Getting Started with Pentest-as-a-Service 

Pentest-as-a-Service is the concept of contracting repeat pentests, across the same assets, and managing vulnerabilities long-term, with the intent of hardening the environment. Normally, this means integrating that testing into development, cybersecurity policy, and...

Meet our Pentesters: Mike Terhaar

Meet our Pentesters: Mike Terhaar

Cyver relies on a network of skilled professional pentesters to meet the needs of our clients. Mike Terhaar is our lead pentester and he’s been involved with cybersecurity since the early days of the world wide web. Since then, he’s joined and led pentesting teams and...

What Does a Pentest Actually Cost?

What Does a Pentest Actually Cost?

Pentesting is an important part of modern cybersecurity. You hire a pentester or pentesting team to assess your application’s security and to attempt to hack your servers, networks, and applications to steal data – as part of proof that you do or not have...

Boost Time to Fix Rates with Smarter Pentest Deliverables

Boost Time to Fix Rates with Smarter Pentest Deliverables

In most cases, when you request a pentest, it’s either with the goal of hardening your environment or tackling specific security concerns or to meet a compliance goal. In either of those cases, you receive a list of vulnerabilities we find, along with remediation...