TLPT (Threat-Led Penetration Testing): Objective and Methodology In a context where cyberattacks are becoming more sophisticated, targeted and persistent, traditional security approaches are reaching their limits. I... 24.02 Applications
GCP Penetration Testing: Methodology and Use Cases Pentesting a GCP (Google Cloud Platform) infrastructure and the web applications deployed on it is a key step in identifying vulnerabilities and stren... 11.09 Cloud
AWS Penetration Testing: Objectives, Methodology and Use Cases AWS is a prime target for attackers. Its growing popularity and strategic role make it an attractive service. To limit the risks, it is crucial to put... 07.01 Cloud
Assumed Breach: Objectives, Methodology, Test Scenarios and Use Cases At a time when cyber attacks are increasing in frequency, sophistication and impact, traditional defensive approaches, while necessary, are no longer ... 30.12 Applications
What is Red Teaming? Methodology and Scope of a Red Team Operation With cyber attacks on the increase, the security of organisations is now a priority. And to respond effectively to this growing threat, Red Teaming is... 30.12 Applications
Azure Penetration Testing: Objectives, Methodology and Use Cases Like other cloud services, Azure is a prime target for attackers. This is due to its growing popularity and strategic importance for businesses. To re... 08.11 Cloud
Security Audits: Objectives, Types and Methodologies With cyberattacks on the rise, carrying out an IT security audit has never been a higher priority for businesses. Web applications, mobile apps, APIs,... 06.08 Applications
Black Box Penetration Testing: Objective, Methodology and Use Cases During a penetration test, we generally consider 3 test conditions: black, grey or white box. These test conditions correspond to the levels of inform... 11.03 Applications
White Box Penetration Testing: Objectives, Methodology and Use Cases When pentesting a web application, an API or an internal network, there are generally 3 approaches: black box, grey box and white box testing. These a... 29.02 Applications