Stay up to date with our news and publications

Browse our news and publications to stay up to date on cyber risk simulations and threat modeling. An overview of all the foreseeti news can also be found on our mynewsdesk page or register for our newsletter. Register can for our newsletter can be done by the sing up button or by sending an email to marketing@foreseeti.com

  • Connecting the future to our cities

    Connecting the future to our cities

    Connecting the future to our cities foreseeti has been awarded funding from Swedish Energy Agency together with KTH Royal Institute of Technology and Umeå University …
  • Using cyber simulations against cyber attacks

    Using cyber simulations against cyber attacks

    Using cyber simulations against cyber attacks Article on benefits of managing cyber risk by using attack simulation published on TechHQ. foreseeti mentioned as key vendor …
  • Newsletter May: Address Structural Vulnerabilities

    Newsletter May: Address Structural Vulnerabilities

    Newsletter May: Address Structural Vulnerabilities Read about structural vulnerabilities, IT infrastructure, our new securiCAD release and much more! Find our newsletter may here. 
  • Online Course in Ethical Hacking 7,5 hp

    Online Course in Ethical Hacking 7,5 hp

    Online Course in Ethical Hacking 7,5 hp This summer, KTH Royal Institute of Technology starts a new Ethical course taught by foreseeti founders and professors …
  • SIG Security Event

    SIG Security Event

    SIG Security Event On the 2nd of May, foreseeti hosted a SIG Security, FOKUS seminar. During this evening foreseeti's Jacob Henricson (former CISO of Ericson) …
  • From spaghetti architecture to secure IT system

    From spaghetti architecture to secure IT system

    Pod cast - From spaghetti architecture to secure IT system IT architecture has evolved over many years creating a spaghetti architecture of intertwined components all …
  • Whitepaper structural vulnerabilities

    Whitepaper structural vulnerabilities

    White paper structural vulnerabilities Structural vulnerabilities - What are they and why do they matter? Vulnerability scanners often report large numbers of vulnerabilities in corporate …
  • SEGRID detailed reference model uses securiCAD

    SEGRID detailed reference model uses securiCAD

    SEGRID detailed reference model uses SECURICAD® At the end of 2017 the EU project SEGRID  (Security for Smart Electricity GRIDs ) was successfully finished after more …
  • Courses in Ethical Hacking

    Courses in Ethical Hacking

    Courses in ethical hacking "Important that many people have knowledge about hacking" News about companies who are hacked are on the order of the day, …
  • Pontus Johnson about ”The Market of Vulnerabilities”

    Pontus Johnson about ”The Market of Vulnerabilities”

    Pontus Johnson about ''The Market of Vulnerabilities'' On May 12 2017, one of the biggest virus attacks in history began. Wannacry, which encrypted computers and demanded …

TAKE A LOOK AT OUR LATEST NEWSLETTER