When is the right time to perform a pentest? Performing a pentest can be part of your objectives, without it being the priority of the moment. This for various reasons: developments are in progre... 07.07 Applications
IT Security Audit: What You Need to Know There are several types of IT security audits: organizational audits, technical audits and penetration testing. All these variants are comp... 27.05 Applications
How to Securely Store Passwords in Database? Storing passwords securely is a recurring concern.But what are the main methods, how do they work, and what are they worth against current password cr... 25.05 Applications
Penetration Testing: Approach, Methodology, Types of Tests and Rates Cybersecurity Issues for Businesses in 2020 The current trend is to strengthen the security requirements for customers, partners and investors. Securi... 12.05 Applications
How to Know Your Attack Surface (And to Reduce it) Abraham Lincoln (repeating a woodsman) would have answered the question: what would you do if you had just six hours to chop down a tree? I would spen... 12.03 Applications
Logging & Monitoring: definitions and best practices The OWASP Top 10 2017 introduces the risk of insufficient logging and monitoring. Indeed, inherent problems in this practice are often underestimated ... 21.01 Applications
Internal Pentest: What You Need to Know About this Type of Security Audit When we talk about cyberattacks, we often think of malicious activities coming from external attackers, while internal attacks are on the rise. In the... 28.05 Infra & Network
What R.O.I for a Security Audit? It is a question that we often hear. Unfortunately Sorry, we don’t have a ready made formula to reveal. The return on investment of a pentest is compl... 28.11 Applications
7 Questions to Ask Yourself Before Doing a Penetration Test Security is essential, and you agree with that. You want indeed to do a penetration test (or pentest) on your solution soon… Here are 7 question... 02.05 Applications
Recon Audit: Which Information About Your Company Can Be Found Online? “All the success of an operation lies in its preparation”, Sun Tzu. Already true in the 6th century BC, this maxim remains true in the 21st century. A... 11.04 Applications
GDPR: Technical Security Measures Updated Dec 1. 2020 More than 2 years after the GDPR came into force (May 25, 2018), sanctions have been pronounced by several data protection authori... 13.03 Applications
Exploiting google dorks to strengthen your security [Article updated on November 8, 2022] Have you used google dorks today? If you have searched for a word within quotes or combined two terms with AND, ... 10.01 Applications