Are your Corporate Data and Sensitive Documents on the Dark Web? From a cybersecurity point of view, the dark web is like a huge marketplace where sensitive data (personal data, bank details, email addresses, creden... 12.04 Applications
How To Define The Scope Of A Pentest? Defining the scope of a penetration test is a delicate step. What will be the target of the pentest? More precisely, which functional and technical as... 17.09 Applications
When is the right time to perform a pentest? Performing a pentest can be part of your objectives, without it being the priority of the moment. This for various reasons: developments are in progre... 07.07 Applications
IT Security Audit: What You Need to Know There are several types of IT security audits: organizational audits, technical audits and penetration testing. All these variants are comp... 27.05 Applications
Penetration Testing: Approach, Methodology, Types of Tests and Rates Cybersecurity Issues for Businesses in 2020 The current trend is to strengthen the security requirements for customers, partners and investors. Securi... 12.05 Applications
White paper: Security of IoT Wireless Technologies 25 pages to know the existing and exploitable vulnerabilities on these technologies, as well as the means to counter or reduce the risks. 05.02 IoT
Bluetooth Low Energy & Security of Connected Devices Alternative to classic Bluetooth, Bluetooth Low Energy is chosen increasingly for the IoT. This technology, also known as the abbreviation BLE, is est... 08.08 IoT
Pentest IoT: 10 hardware & software tests Internet of Things security is a current topic, however penetration testing on connected devices are far from being a widespread practice. Most manufa... 24.04 IoT