We’re Security Current’s 2022 CISO Choice Awards Finalists!
The Security Current CISO Choice Awards™ 2022 returns this year, recognising the security leaders in key technology and business categories.
The Security Current CISO Choice Awards™ 2022 returns this year, recognising the security leaders in key technology and business categories.
CovertSwarm are pleased to announce that we’ve been selected as finalists in both the ‘Start-up Security Company’ and the ‘Breach & Attack Simulation Service Provider’ categories, as a result of our innovations in continuous security testing that have led our clients to a stronger security posture and reduced level of risk.

CovertSwarm CEO, Anders Reeves said:
“Nothing is more important to CovertSwarm than constantly compromising the security of our clients and to outpace their genuine cyber threats. To be recognised by Security Current’s panel as being both an exceptional cyber start-up and a ‘finalist-level’ breach and attack simulation service provider is something I, and our whole team, are exceptionally proud of.
This news is such an honour for all of us at CovertSwarm. We exist to challenge the status quo in cybersecurity, and so to have our approach and methods so positively judged by this esteemed panel of CISOs is fantastic assurance that we’re one of the most cutting edge cyber businesses leading the evolution of our industry today.”
The results of the Security Current CISO Choice Awards™ 2022 will be announced on Tuesday 18th October.
Want to learn more about our groundbreaking approach to cyber security? Contact CovertSwarm today.
Jayson E Street Joins CovertSwarm
The man who accidentally robbed the wrong bank in Beirut is now part of the Swarm. Jayson E Street joins as Swarm Fellow to help us…
iNTERCEPT – How A Small RF Experiment Turned Into A Community SIGINT Platform
I’ve always been fascinated by RF. There’s something about the fact that it’s invisible, the fact that you might be able to hear aircraft passing overhead…
When Your IDE Becomes An Insider: Testing Agentic Dev Tools Against Indirect Prompt Injection
Agentic development tools don’t need to bypass your firewall. They’re already inside. And if an attacker can control what they read, they can control what they…