CUBER

Cuber Technology is based in Estonia. The fintech company is a subsidiary of LHV Group and is the developer of Cuber Wallet. LHV Bank is young forward thinking bank from Estonia. Originally an investment firm the bank was established in 2009. They are dedicated to serve private customers and SME-s as well as quickly growing enterprises. LHV puts the emphasis on well designed, easy to use and comfortable electronic channels such as internet bank, mobile bank and online chat for communication. LH... V is a fast growing and innovation friendly company and as such they like to partner up with other similar enterprises. As one of the first banks to officially hire a crypto currency expert, it has been the bank’s aim to bring to market a working payment solution using blockchain. ChromaWay is an international software development company specializing in colored coin technology. Established in 2014 and based in Sweden ChromaWay unites developers from Sweden, Israel, Ukraine and Russia.
CUBER
Industry:
Finance FinTech Mobile Payments Payments
Website Url:
http://www.cuber.ee
Status:
Active
Technology used in webpage:
SPF Google Font API Apache Sectigo SSL Sectigo Domain SSL WordPress 5.7 PHSDL Spam Filter
Similar Organizations
Official Site Inspections
http://www.cuber.ee
- Host name: sn-69-25.tll07.zoneas.eu
- IP address: 217.146.69.25
- Location: Estonia
- Latitude: 59
- Longitude: 26
- Timezone: Europe/Tallinn

More informations about "Cuber"
Cybernetica (Estonian company) - Wikipedia
This Estonian corporation or company article is a stub. You can help Wikipedia by expanding it.See details»
Meet with our e-governance experts - Cyber
E-mail: press@cyber.ee. Important Notice: Cybernetica never calls or sends messages to external parties requesting personal information for authentication. Please stay vigilant against …See details»
Cybernetica - Crunchbase Company Profile & Funding
Contact Email info@cyber.ee Phone Number 3726397992 Cybernetica is a R&D intensive ICT company that researches, develops and manufactures software …See details»
Highly acclaimed digital identity | Cybernetica
Digital Transformation partnership in North Africa, and consulting with E&Y EE; Secure data exchange platform to connect 12 ministries. Change management and stakeholder training. …See details»
Cybernetica AS | European Monitor of Industrial Ecosystems
European Cyber Security Organization (ECSO) MPC Alliance. ISO/IEC JTC 1 SC 27. Estonian Centre for Standardisation and Accreditation. Estonian Information Security Association. ...See details»
Cybernetica AS – Vikipeedia
Cybernetica AS [1] on Eesti IT-ettevõte ning rahvusvaheliselt evalveeritud eraõiguslik teadus- ja arendusasutus.. Cybernetica loob tehnoloogiaid süsteemide jaoks, mille töökindlus peab …See details»
Sponsors & Exhibitors | Security for Space Systems (3S) conference
Sponsors CYBERNETICA https://cyber.ee/ Cybernetica is an R&D intensive ICT company with over 25 years of experience as a flagship organisation in developing and implementing …See details»
National coordination center (NCC-EE) - RIA
NCC-EE vision. In Estonia, cyber security services are offered by viable, forward-looking companies with sufficient workforce focusing on research-based activities, which visibly …See details»
ISO - AKIT - Cyber
(= International Organization for Standardization) (kreeka ισό = sama-; võrd-) olemus valitsusväline rahvusvaheline organisatsioon, mis ühendab standardiasutusi, asutatud 1947, …See details»
Estonia launches cyber range training exercises in …
Dec 11, 2024 More information: [email protected]. Estonian Centre for International Development is a government foundation that manages and implements Estonia’s participation in international development cooperation …See details»
Future-proof technologies for e-governance | Cybernetica
E-mail: press@cyber.ee. Important Notice: Cybernetica never calls or sends messages to external parties requesting personal information for authentication. Please stay vigilant against …See details»
Challenges of Federating National Data Access Infrastructures
Fmargus,janwilg@cyber.ee Abstract. X-Road is a secure and scalable database access middleware originally developed in Estonia in early 2000s. In 2014, a decision was ... between …See details»
X-Road - Joinup
Hannes.kiivet@ria.ee Liina Areng liina.areng@ria.ee Cybernetica AS info@cyber.ee Type Service Sub-Type Infrastructure Context Cross-sector, Cross-Border Base Registry type All Operating …See details»
Identifying Obstacles of PQC Migration in E-Estonia - CCDCOE
Jelizaveta.vakarjuk@cyber.ee Peeter Laud Cybernetica AS Tartu, Estonia peeter.laud@cyber.ee Nikita Snetkov Cybernetica AS and Department of Software Science Tallinn University of …See details»
Developing requirements for the new encryption mechanisms in …
Fmart.oruaas,jan.willemsong@cyber.ee 2 STACC, Narva mnt 20, 51009 Tartu, Estonia Abstract. After the Estonian ID-card crisis in 2017, it became appar-ent that the document encryption …See details»
Jaak Tarien: bridging defence & cybersecurity | Cybernetica
Oct 19, 2022 My last position was the director of NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), where I served from 2018 to 2022. My main defence experience …See details»
Artificial Intelligence System Risk Management Methodology …
We have created three blueprints of AI system deployments to which an organization deploying AI can match their use case. For each blueprint, we have created high-CyCon 2024: Over the …See details»
Assisting Ukrainian Organizations Boost Cyber Resilience: UA-EE …
Importance of Cybersecurity Exercises for Ukrainian Organizations. The UA-EE Cyber Shield exercise offered participants hands-on experience in defending IT systems against …See details»
EIS - cyber.ee
The goal of TREsPASS was to create a mart ‘attack navigator’, which will trace potential weak points within an organization or a given infrastructure. UaESMC 2012 - 2015 ... E-mail: …See details»
From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks …
3 days ago Unlike traditional cyber threats that target a single organization, supply chain attacks exploit the weakest links within a business ecosystem. As businesses work to mitigate risks, it …See details»