Category Archives: Solutions

What does a penetration test vs a vulnerability scanner bring?

Vulnerability scanner vs penetration testThe first one and the second are said to be the best allies of CISO (and in general people in charge of IT security). There are though two different tools in a security strategy. What are the different characteristics of each?

Let’s start with the vulnerability scanner.

It is a software that is programmed to run tests on your platform, on your information system – … to detect vulnerabilities. A scanner identifies vulnerabilities thanks to its database containing the known vulnerabilities and common security issues. They go through networks, services, applications, etc.

First characteristic, the tests are automated. This means they are fast and a whole system can be easily tested in some hours / days, depending on its size.

Continue reading

Mobile Application Penetration Testing: What is it? And How Does it Work?

Mobile Application Penetration Testing how is it and how does it workAs mobile apps are more and more used by every field of activity, they become also more and more interesting for malicious attackers. Apps need therefore to have a strong security, just as websites. That’s why we do mobile apps penetration testing that takes into consideration their specificities.


Objective of a Mobile Application Penetration Testing?

Continue reading

Web Application Penetration Testing: How Does it Work?

Web Application Penetration TestingYour colleagues or your boss are talking about penetration testing (or pen testing or penetration test or pen test or pentest). You’re asked to explain them what it is, how it’s done, or what is tested? (cause you’re the tech one, so you surely know that stuff, right? Especially if it’s not your field.)

So here are some key elements to answer them, clear and simple. For more details, feel free to contact us.


Objective of a Web Application Penetration Testing?

Continue reading

10 Golden Rules to Protect Your Professional Computer

10 Golden Rules Title Picture


Summer time is upon us, and we are more relaxed as holidays approach… But it’s not a reason to forget good habits regarding digital security at work, as hackers don’t go on holiday!



  • Choose a complex password with at least 10 characters.
    It should ideally have four different types of characters: lowercase, uppercase, numbers and special characters (included punctuation marks). The longer and more complex the password is, the better, as the combination possibilities increase.
    Forget “easy” passwords like the name of your partner, of your beloved kids or of your pet.

Continue reading