Can IoT be secure? What journalists ask Cyberus Labs about?

Can IoT be secure? What journalists ask Cyberus Labs about?

Published August 22, 2018

Cyberus Labs’ game changing, “Post-Credential Era”, multifactor authentication solution Cyberus Key enjoys growing interest also in media. Cyberus Labs’ COO, Marek Ostafil, was invited by one of the major Polish TV channels wPolsce.pl to talk live about new approach towards cybersecurity at the onset of IoT,  eliminating  its weakest link, such as passwords, user &

More
ELIoT Pro – A Success Story at Impact’18

ELIoT Pro – A Success Story at Impact’18

Published June 18, 2018

On June 13th at Impact’18 in Kraków, Cyberus Labs presented its success story of ELIoT Pro (Easy & Lighweight IoT Protector) – a project selected for funding by the SME Instrument (Horizon 2020) Program. We were invited to present our experience it during a workshop organized by National Contact Point for Research Programmes of the European Union Institute of Fundamental Technological

More
Cyberus Labs selected by European Commission to secure world of IoT.

Cyberus Labs selected by European Commission to secure world of IoT.

Published May 29, 2018

Cyberus Labs introduces ELIoT Pro (Easy & Lightweight IoT Protector) – a game-changing end-to-end cybersecurity solution dedicated to all IoT networks and devices. ELIoT Pro is an extension of the existing Cyberus Labs’ user authentication system CYBERUS KEY that is the fundamental element for Human to Machine authentication and communication for ELIoT Pro. ELIoT Pro

More
The journey from Enigma to Cyberus Key

The journey from Enigma to Cyberus Key

Published January 12, 2018

85 years ago, Polish mathematicians: Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the famous and considered to be unbreakable German Enigma cypher. It was Marian Rejewski who had deciphered the first message coded by Enigma on December 31st, 1932. But what Enigma and this episode has to do with Cyberus Key and cybersecurity of

More
Tworzymy system cyberbezpieczeństwa Polski

Tworzymy system cyberbezpieczeństwa Polski

Published April 10, 2017

6 kwietnia 2017 roku to ważna dla Cyberus Labs data. W tym dniu miało miejsce II Forum Cyberbezpieczeństwa – CYBERSEC PL. Dyrektor generalny Cyberus Labs – George Slawek był jednym z panelistów dyskusji na temat polskiego rynku cyberbezpieczeństwa w perspektywie innowacji. CYBERSEC PL jest ważnym wydarzeniem dla całego kraju, ponieważ dotyka istotnych kwestii związanych z bezpieczeństwem cybernetycznym Polski. Dodatkowo

More
From Krakow to Prague

From Krakow to Prague

Published March 29, 2017

CyberCentral Conference in Prague invite us to take part in the TechZone & Startups area. It is high level summit with cybersecurity experts from whole Europe and particularly focused on CEE region. Engagement, sharing knowledge and developing solutions sets out the specifics of this conference. Marek Ostafil – COO Cyberus Labs is going to present in 3 minutes our solution

More
Are we really safe?

Are we really safe?

Published March 24, 2017

Ubiquity, usability, and ease of use – this is what we expect from various online services and mobile apps providers today. Numerous spheres of our everyday life are increasingly being moved to cyberspace. It is almost a parallel reality in which 50% of population already lives their lives. Similarly, mobile technology development has made us

More
Cyberus Labs about cybersecurity at Washington, DC

Cyberus Labs about cybersecurity at Washington, DC

Published March 10, 2017

We are honored to inform that Cyberus Labs had been invited to take a part in the official delegation of the Government of Poland to USA to talk about cooperation between Poland and the US in the field of cyber security. Our startup was chosen as one of two which was invited for this event.

More
Ciemna strona biometrii – z perspektywy Twojej prywatności

Ciemna strona biometrii – z perspektywy Twojej prywatności

Published November 10, 2016

Dzięki dokonaniom biometrii obserwujemy ogromny technologiczny postęp. Rozpoznawanie indywidualnych cech ludzkich jest wykorzystywane między innymi do autoryzacji użytkowników przy kontroli dostępu do pomieszczeń, urządzeń i zaszyfrowanych danych. Rozwiązania biometryczne są stosowane między innymi na amerykańskich i australijskich lotniskach. W Australii odprawa paszportowa z zastosowaniem czytnika twarzy to proces trwający zaledwie 6 sekund, dlatego stosuje ją

More
Are you part of the (cyber)problem? Or part of the (cyber)solution?

Are you part of the (cyber)problem? Or part of the (cyber)solution?

Published October 28, 2016

To znane powiedzenie dotyczy pewnej postawy, którą można  zastosować wszędzie. Pytanie jest właśnie takie: czy jesteśmy częścią problemu, czy raczej to, co robimy zmierza do jego rozwiązania?   A problem jest następujący: około 1,5 miliarda danych osobowych zostało przejętych przez cyberprzestępców, w tym hasła, loginy, dane biometryczne.[i]   Jeśli ktoś uważa, że ten problem akurat

More