2021 web, mobile, IoT cybersecurity statistics – Strengthen your security with a pentest From data breaches to malwares, cybersecurity is in the headlines almost every day and has become a major concern. Especially in the context of the he... 07.09 Applications
What security needs and what type of pentest for a startup? For many startups, cybersecurity and penetration testing in particular are issues that need to be addressed because of the requests of their customers... 20.08 Applications
Why testing insider threats during a pentest is important? Risks assessed during a pentest generally focus on attacks perpetrated from outside the information system. Indeed, a classic approach consists of fir... 01.07 Applications
SaaS application pentest: What are the main security challenges? Security is one of the main concerns of SaaS application publishers. Security is essential for users to trust the solution and to ensure tha... 29.06 Applications
How to Strengthen the Security of Your Mobile Applications to Counter the Most Common Attacks? Mobile applications are part of the elements to secure as they process personal data, access sensitive information, and in some cases enable remote co... 22.06 Applications
Security certifications: What can you require from pentest providers and what can you get after a pentest? CREST, OSCP, CEH… Should you require certifications from your pentest providers? To select a pentest provider, security certifications are obviously u... 03.06 Applications
Pentest or Bug Bounty: Which approach to choose for your security tests? ‘Bug bounty signs the end of pentests’ ‘Bug bounty, the death of the traditional penetration test’… Do you remember these article headlines? Today we ... 28.04 Applications
Are your Corporate Data and Sensitive Documents on the Dark Web? From a cybersecurity point of view, the dark web is like a huge marketplace where sensitive data (personal data, bank details, email addresses, creden... 12.04 Applications
Security of e-commerce websites: what are the priorities for a pentest? Regularly carrying out penetration tests on e-commerce websites ensures a good level of security. This is necessary to ensure the proper functioning o... 30.03 Applications
How to Strengthen the Security of Your Web Applications to Counter the Most Common Attacks? Most web applications manipulate personal and/or business data, in other words, sensitive data. Passwords, email addresses, credit card numbers, healt... 01.02 Applications
9 Misconceptions about Web and Mobile Applications Security Web and mobile applications are at the core of most companies’ activities. Whether you’ve already deployed them or that they are still und... 09.12 Applications
Black, Grey or White Box Penetration Test? 3 Options for a Security Audit During a security audit, 3 approaches are possible. They reflect different levels of information and access given to pentesters. The choice of th... 03.11 Applications