Logistics companies security: what are the challenges and priorities during a penetration test? Logistics organisations are confronted to the challenge of relying on new digital solutions without compromising their security. Facing a booming mark... 02.11 Applications
Should you provide access to source code during a web application pentest? Providing access to the source code during a pentest has mainly advantages or disadvantages, depending on the point of view! Here is our feedback, whi... 26.10 Applications
How to secure authentication, session management and access control systems of your web applications? The security of web applications is a major issue for organisations. SaaS platforms, internal applications, or e-commerce websites, all these systems ... 05.10 Applications
Pentest statistics and most frequent vulnerabilities We do pentests every day. (Well, 5 days a week.) Today we’re taking you behind the scenes: we’ve got a closer look at the penetration tests performed ... 04.10 Applications
Phishing: how to prevent email spoofing? Used for phishing and other social engineering attacks, email spoofing is terribly tricky. Well executed, it’s difficult to detect and misleads the re... 21.09 Phishing & Social Engineering
2021 web, mobile, IoT cybersecurity statistics – Strengthen your security with a pentest From data breaches to malwares, cybersecurity is in the headlines almost every day and has become a major concern. Especially in the context of the he... 07.09 Applications
What security needs and what type of pentest for a startup? For many startups, cybersecurity and penetration testing in particular are issues that need to be addressed because of the requests of their customers... 20.08 Applications
Why testing insider threats during a pentest is important? Risks assessed during a pentest generally focus on attacks perpetrated from outside the information system. Indeed, a classic approach consists of fir... 01.07 Applications
SaaS application pentest: What are the main security challenges? Security is one of the main concerns of SaaS application publishers. Security is essential for users to trust the solution and to ensure tha... 29.06 Applications
How to Strengthen the Security of Your Mobile Applications to Counter the Most Common Attacks? Mobile applications are part of the elements to secure as they process personal data, access sensitive information, and in some cases enable remote co... 22.06 Applications
Security certifications: What can you require from pentest providers and what can you get after a pentest? CREST, OSCP, CEH… Should you require certifications from your pentest providers? To select a pentest provider, security certifications are obviously u... 03.06 Applications
Pentest or Bug Bounty: Which approach to choose for your security tests? ‘Bug bounty signs the end of pentests’ ‘Bug bounty, the death of the traditional penetration test’… Do you remember these article headlines? Today we ... 28.04 Applications