Articles

Discover our latest articles! Some articles are exclusively for our 'friends'. Want to become a friend? Join here.

thumbnail
Interview

Queen Bees #2 - Nadine Michaelides

Queen Bees is Cyberhive's interview series that regularly shares inspiring career insights from women leading in thei

thumbnail
News

ECSO Member YesWeHack raises 26 Million Euros to accelerate its growth and expansion

ECSO Member YesWeHack has announced a 26 Million Euros worth Series C funding round.

thumbnail
Opinions

Beyond the Screen Essential Cybersecurity Awareness for Parents and Kids

Our community writer Matthias Muhlert wrote an article on awareness for partners with children that are online.

aikido series A
News

Aikido lands €15,9M Series A

Cyberhive’s user Aikido lands €15,9M Series A, bringing its ‘no BS’ security platf

Do you want Gartner to consider your company?
Analysis

Do you want Gartner to consider your company?

Get your customers to talk and ask about you!

In addition to my daily job at

Optimism and Challenges: Tales from the European Cybersecurity startups
Analysis

Optimism and Challenges: Tales from the European Cybersecurity startups

Listening to those working in transforming the region into a global cybersecurity leader

 

Artificial intelligence and cybersecurity
Report

Artificial intelligence and cybersecurity

This two pager was written by the European Parliamentary Research Service (EPRS), in-house research service and think

Front page XZ Opensource Supply Chain Threat Intelligence Brief April 2024
Report

XZ Opensource Supply Chain Threat Intelligence Brief April 2024

This report was published by Cyber Cert Labs, a friend of the hive.

thumbnail
Report

Navigating Cybersecurity Policy in the EU: A Call for New Legislators

In the lead-up to the 2024 EU elections and the establishment of a new European Parliament, the European Cybe

thumbnail
Analysis

Choosing Cybersecurity solutions: The role of independent testing organizations

In their own words: Insights from 3 experts in cybersecurity evaluations

When you are choosing a cybersecurit