TLPT (Threat-Led Penetration Testing): Objective and Methodology In a context where cyberattacks are becoming more sophisticated, targeted and persistent, traditional security approaches are reaching their limits. I... 24.02 Applications
Assumed Breach: Objectives, Methodology, Test Scenarios and Use Cases At a time when cyber attacks are increasing in frequency, sophistication and impact, traditional defensive approaches, while necessary, are no longer ... 30.12 Applications
What is Red Teaming? Methodology and Scope of a Red Team Operation With cyber attacks on the increase, the security of organisations is now a priority. And to respond effectively to this growing threat, Red Teaming is... 30.12 Applications
What are IoT Attack Vectors and Security Challenges? IoT security is a key issue for organisations. In all sectors and areas of activity (healthcare, industry, services, transport, energy, etc.), the IoT... 06.08 IoT
Security Audits: Objectives, Types and Methodologies With cyberattacks on the rise, carrying out an IT security audit has never been a higher priority for businesses. Web applications, mobile apps, APIs,... 06.08 Applications
Penetration Testing: Methodology, Scope and Types of Pentests With cybersecurity risks on the rise, it is becoming more and more obvious to carry out a penetration test (pentest) to reassure customers, partners a... 05.02 Applications
Pentest statistics and most frequent vulnerabilities We do pentests every day. (Well, 5 days a week.) Today we’re taking you behind the scenes: we’ve got a closer look at the penetration tests performed ... 04.10 Applications
2021 web, mobile, IoT cybersecurity statistics – Strengthen your security with a pentest From data breaches to malwares, cybersecurity is in the headlines almost every day and has become a major concern. Especially in the context of the he... 07.09 Applications
What security needs and what type of pentest for a startup? For many startups, cybersecurity and penetration testing in particular are issues that need to be addressed because of the requests of their customers... 20.08 Applications
Security certifications: What can you require from pentest providers and what can you get after a pentest? CREST, OSCP, CEH… Should you require certifications from your pentest providers? To select a pentest provider, security certifications are obviously u... 03.06 Applications
Pentest or Bug Bounty: Which approach to choose for your security tests? ‘Bug bounty signs the end of pentests’ ‘Bug bounty, the death of the traditional penetration test’… Do you remember these article headlines? Today we ... 28.04 Applications