The Yogosha blog

State-of-the-hack cybersecurity blog.

Interviews
07/03/2024

Mazars: “We Need to Go Further Than Traditional Pentesting”

How do you bring cybersecurity into the accounting profession? Christophe Ballihaut is in charge of…
02/02/2024

Bug Hunters: 4 Paths to Join the Yogosha Strike Force

Security researchers can now join the Yogosha Strike Force (YSF) via four selection paths: skills,…
18/12/2023

DORA: A Guide to Security Testing for Regulated Entities

Speed up your DORA compliance with this four-chapter guide to security testing requirements for entities…
18/12/2023

DORA and the Digital Operational Resilience Testing Program

Find out all there is to know about the digital operational resilience testing program, a…
18/12/2023

DORA: The Challenge of Scaling Security Testing

Scaling security testing is a major challenge for DORA-regulated entities. Let's explore concrete solutions for…
18/12/2023

DORA: Everything About Threat-Led Penetration Testing (TLPT)

Some entities regulated by DORA are required to carry out enhanced security tests, in the…

Product News

Subscribe to our NEWSLETTER