What is Pseudonymisation? Techniques and Best Practices What is data pseudonymisation? Pseudonymisation is a data protection technique, which consists of processing data in such a way that it is not possibl... 09.02 Applications
How to secure a server? Server security is a major issue for companies. Indeed, being a central element in the functioning of all the components of an information system (app... 19.07 Applications
How to secure an internal network? Network security is a major challenge for companies. Indeed, the growing importance of IT assets, the interconnection of information systems and their... 25.04 Infra & Network
Pentest statistics and most frequent vulnerabilities We do pentests every day. (Well, 5 days a week.) Today we’re taking you behind the scenes: we’ve got a closer look at the penetration tests performed ... 04.10 Applications
What security needs and what type of pentest for a startup? For many startups, cybersecurity and penetration testing in particular are issues that need to be addressed because of the requests of their customers... 20.08 Applications
Why testing insider threats during a pentest is important? Risks assessed during a pentest generally focus on attacks perpetrated from outside the information system. Indeed, a classic approach consists of fir... 01.07 Applications
Security certifications: What can you require from pentest providers and what can you get after a pentest? CREST, OSCP, CEH… Should you require certifications from your pentest providers? To select a pentest provider, security certifications are obviously u... 03.06 Applications
Pentest or Bug Bounty: Which approach to choose for your security tests? ‘Bug bounty signs the end of pentests’ ‘Bug bounty, the death of the traditional penetration test’… Do you remember these article headlines? Today we ... 28.04 Applications
Are your Corporate Data and Sensitive Documents on the Dark Web? From a cybersecurity point of view, the dark web is like a huge marketplace where sensitive data (personal data, bank details, email addresses, creden... 12.04 Applications
How to Strengthen the Security of Your Network Infrastructure to counter the Most Common Attacks? The network infrastructure is at the core of business operations in most industries. It can be considered the nerve centre of the entire IT organisati... 12.03 Infra & Network
Black, Grey or White Box Penetration Test? 3 Options for a Security Audit During a security audit, 3 approaches are possible. They reflect different levels of information and access given to pentesters. The choice of th... 03.11 Applications
How To Define The Scope Of A Pentest? Defining the scope of a penetration test is a delicate step. What will be the target of the pentest? More precisely, which functional and technical as... 17.09 Applications