RESOURCES
Welcome Konrad Falk as Our New Senior Cyber Advisor & Architect!
Konrad brings a wealth of experience from the Cyber Security and IT Security industry, boasting a comprehensive background in all aspects of Information Technology, including programming, networking, and cyber security. His passion for securing companies, educating others about security, and driving customer satisfaction is unparalleled. Konrad values the trust placed in him by our Managing Director and Group COO and is keen to contribute to our mission with his fervent passion for security. He is particularly eager to tackle the challenges of this role, especially those that extend beyond his advisory capabilities. Konrad thrives on being hands-on in managing security incidents, leveraging his extensive experience to navigate today’s evolving threats.
Konrad’s decision to join our company was significantly influenced by the opportunity to collaborate with esteemed security professionals he knows and trusts. This speaks volumes about the importance of our team’s expertise and camaraderie. With a broad knowledge base that spans from programming to an in-depth understanding of low-level networking protocols, firewalls, and IPS, Konrad’s adaptability and comprehensive expertise in coding, security operations, and reverse engineering make him an invaluable asset to our organisation. More importantly, our customers stand to benefit immensely from his skills and experience.
Konrad embodies a proactive work ethic, preferring to give and receive real-time feedback to swiftly address concerns or improvements. His personal values and work ethic are set to significantly enhance our company culture. His approachability and emphasis on trust in security consultancy are bound to strengthen our team dynamics and client relationships.
Konrad is fully prepared to represent our company’s values and mission, both internally and externally, with the agility and responsiveness of a ”speedboat” in the cyber security market. He seeks minimal micromanagement, relying instead on professionalism, autonomy, and the right tools to achieve success.
His innovative approach involves adopting a ”helicopter view” of security, allowing him to connect various elements for a comprehensive strategy or to solve complex problems. Konrad’s past experiences have sharpened his ability to unite teams towards common goals, emphasising the value of collective effort over individual expenditure.
Konrad aspires to continue his role as a security officer and advisor, finding great personal satisfaction in a role that he enjoys. This high level of job satisfaction enables him to stay focused on the complex task of keeping abreast of how companies, threat actors, and attacks evolve in the modern threat landscape.
Please join us in giving Konrad Falk a warm welcome to our company. We eagerly anticipate the expertise, innovation, and leadership he will bring to our team.
ABOUT CYNODE
Cynode is a specialised cyber security services provider operating in the Nordics and the UK, working with medium to large size organisations. Cynode offers services that make immediate impact on clients existing security posture and build organisational capabilities to minimise cyber risk in the long term, with affordable subscription models.
Cynode has fully implemented an adaptive cyber security framework where all services either include or support proactive prevention capabilities so that Cynode clients deal with cyber-attacks early on rather than late where cyber criminals gain network access.
-
Managing Cyber Risk with CTEM and Beyond
Cynode Ultima takes the complexity out of cyber threat management with its all-in-one security platform. Building on Gartner's CTEM framework, we've created a solution that brings together essential security tools - from threat intelligence and vulnerability prioritization to dark web monitoring and attack surface management - in one place. The article explores why organizations often struggle to implement security programs that meaningfully reveal their true risks and security gaps. We show how Ultima bridges this gap by providing an integrated approach that helps businesses understand and address their actual security exposures, making advanced threat management both accessible and actionable.
-
Investing in Dark Web Monitoring: A Practical Guide
Should you invest in a Dark Web Monitoring service? The answer is not as straightforward as you might think—it really depends. Whilst Dark Web Monitoring is undoubtedly valuable, where does it rank in your list of priorities? For instance, if you have a limited budget, should you invest in Dark Web Monitoring or a Security Awareness Programme? The answers to such questions vary for each organisation, but there are some general principles that can guide your decision-making process.
-
The Persistent Threat of Business Email Compromise
Business Email Compromise is a sophisticated type of email and identity based attack that doesn't rely on malware or malicious links. Instead, it leverages social engineering tactics to manipulate human trust and judgement. This makes BEC attacks particularly challenging to detect and prevent, even for organisations with robust protection infrastructures and cyber security awareness programmes.
-
The Risks of Increasing SaaS Use
Organisations increasingly rely on cloud applications, with small enterprises using over 20 SaaS apps per user and large companies exceeding 250 per company. This growth introduces significant cyber security risks, including unauthorised access and Shadow IT, where unsanctioned apps are used without oversight. To mitigate these risks, companies need advanced monitoring solutions like Cynode’s MDR for Cloud Apps Shadow IT, which offers visibility, consent policy enforcement, and threat detection across SaaS platforms, ensuring security and compliance.
-
Interview with Senior Cyber Advisor Per-Olov Kask
Delve into the fascinating career journey of a seasoned cyber security professional who has dedicated over three decades to the ever-evolving IT and cyber security landscape. Starting as an IT technician in 1993, our expert quickly rose through the ranks to become a country IT manager, driven by a passion for combating emerging cyber threats. In 2022, this journey led to an impactful role at Cynode as a Senior Cyber Advisor. Join us as we explore his experiences, insights, and the innovative approaches that make Cynode a leader in the cyber security field.
-
Regular EDR Policy Tuning
The cyber security world has recently focused on EDR technology due to its significant impact across industries. This post explores the evolution from early antivirus software to EDR platforms. Key milestones include the introduction of commercial antivirus software in 1987, the emergence of heuristic and behavioural detection methods in the early 2000s, and the development of Next-Gen Antivirus (NGAV) in 2010. EDR solutions, emerging around 2013, are crucial for detecting, investigating, and mitigating security threats but require regular policy updates and meticulous tuning for optimal performance.
-
Mastering Log Management: Enhancing SIEM and SOC Efficacy
Efficient log management is critical for SIEM and SOC efficacy. Challenges include log agent malfunctions, configuration errors, and network issues. This blog explores four log problem categories, from detection failures to incomplete logs, and introduces innovative solutions for proactive threat detection and response. Learn how Cynode's integrated threat simulation and log validation processes ensure optimal log coverage and enhanced security monitoring. Stay ahead of cyber threats with robust log management practices.
-
Understanding WebApp Exposure
WebApp Exposure Monitoring involves regular assessments and updates to perimeter defence platforms like WAF policies, ensuring alignment with the latest threat intelligence. Having a proactive stance to WebApp attacks is crucial as cyber threats incredibly fast, often outpacing traditional security defences. The process of continuously monitoring web applications allows organisations to more readily detect anomalies and respond to threats in real-time, minimising the risk of data breaches and other cyber incidents.
-
Introduction to Managed Security Service Providers (MSSPs)
Businesses increasingly struggle with cyber security management, especially with limited resources. Managed Security Service Providers (MSSPs) like Cynode offer comprehensive, efficient solutions, managing everything from security infrastructure to incident response, often using cloud services for cost efficiency. This article explores the benefits and services MSSPs provide, underscoring their importance in modern cyber security strategies.
-
Improving SIEM Efficacy as the Market Evolves
As the SIEM market evolves with new mergers and partnerships, Cynode supports practitioners to ensure no security event is missed, offering comprehensive services from threat-centric log and rule validation to complete SIEM management.
-
“Trust me, I was an engineer” – Björn Nilsson
We are pleased to announce Björn Nilsson as the new Head of Security Operations Sweden at Cynode. His extensive experience in cyber security and IT infrastructure marks a significant milestone in enhancing our capabilities. Björn brings a wealth of expertise from various critical roles within the industry.
-
Cynode Boosts Team with Gustav Bivstedt's Technical Expertise
Cynode hires Gustav Bivstedt as a Cyber Advisor to enhance our Cyber Advisory and Assurance Services. His expertise strengthens our technical capacity and supports business growth, including new offerings in security testing, cyber maturity assessments, and proactive risk management with Cyber Threat Intelligence.
-
Meet our "VP of Product" Cumhur Hatipoglu
As Cynode’s CMO, I am constantly impressed by our team's innovation and engagement. Cumhur Hatipoglu, our new VP of Product, enhances our mission to innovate in cyber security and MDR services. His approach integrates NIST CSF and best security practices to ensure our solutions meet clients' evolving needs.
-
Hacking and Cyber Warfare Go Hand in Hand
Sweden, amidst its NATO application and tensions with Russia and Turkey, has experienced a rise in political cyber-attacks. Groups such as Anonymous have targeted governmental infrastructures, leading to data leaks. Escalation of cyber-crime and nation-state backed cyber warfare necessitates global enhancement of defense measures.
-
EU updates NIS Directive. Are you compliant?
The European Union introduced the NIS 2 Directive to improve the cyber security of critical infrastructure systems within its member states and to ensure that digital service providers and operators of essential services have adequate security measures in place to secure their networks and data.
-
Rise of Cyber Due Diligence in M&A Processes
Sweden's post-pandemic economic recovery has spurred M&As. Cynode emphasises integrating cyber due diligence to address vulnerabilities, protect essential information, and optimise security spending, enhancing the security posture before, during and after M&As.