BLOG

Cyver Updates

Follow Cyver for the latest industry updates, case studies, new features, and more.

Meet our Pentesters: Mike Terhaar

Meet our Pentesters: Mike Terhaar

Cyver relies on a network of skilled professional pentesters to meet the needs of our clients. Mike Terhaar is our lead pentester and he’s been involved with cybersecurity since the early days of the world wide web. Since then, he’s joined and led pentesting teams and...

What Does a Pentest Actually Cost?

What Does a Pentest Actually Cost?

Pentesting is an important part of modern cybersecurity. You hire a pentester or pentesting team to assess your application’s security and to attempt to hack your servers, networks, and applications to steal data – as part of proof that you do or not have...

Boost Time to Fix Rates with Smarter Pentest Deliverables

Boost Time to Fix Rates with Smarter Pentest Deliverables

In most cases, when you request a pentest, it’s either with the goal of hardening your environment or tackling specific security concerns or to meet a compliance goal. In either of those cases, you receive a list of vulnerabilities we find, along with remediation...

How to Make the Most of Your Pentest: Setting Pentest Stakeholders 

How to Make the Most of Your Pentest: Setting Pentest Stakeholders 

For many organizations, stakeholders are nothing more than the people who have to buy into a pentest to make it happen. While it’s true that, to a certain extent, getting started is the most important step – making the most of a pentest means involving the people who...

Are You Ready for DigiD Compliance? DigiD Audits and Pentesting

Are You Ready for DigiD Compliance? DigiD Audits and Pentesting

Over 18 million people use DigiD to access private health and government data and services, or essentially more than the full population of the Netherlands. That standard has gained this trust through strict regulation and security standards imposed on the...

API Pentesting & Asset Management: Keeping Track of API Endpoints 

API Pentesting & Asset Management: Keeping Track of API Endpoints 

APIs are quickly becoming the most common vector of attack and breach in many organizations. Integrating and maintaining good API security is crucial, both to long-term security and to compliance. If you’re requesting a pentest of APIs or their endpoints, that...