Cyber Resilience Act (CRA): Step-By-Step Guide to Compliance Need a compliance guide for the Cyber Resilience Act (CRA)? Here's a 15-step roadmap to…Sébastien Palais21/05/2024
Interviews Mazars: “We Need to Go Further Than Traditional Pentesting” How do you bring cybersecurity into the accounting profession? Christophe Ballihaut is in charge of…Sébastien Palais07/03/2024
DORA: A Guide to Security Testing for Regulated Entities Speed up your DORA compliance with this four-chapter guide to security testing requirements for entities…Sébastien Palais18/12/2023
DORA and the Digital Operational Resilience Testing Program Find out all there is to know about the digital operational resilience testing program, a…Sébastien Palais18/12/2023
DORA: The Challenge of Scaling Security Testing Scaling security testing is a major challenge for DORA-regulated entities. Let's explore concrete solutions for…Sébastien Palais18/12/2023
DORA: Everything About Threat-Led Penetration Testing (TLPT) Some entities regulated by DORA are required to carry out enhanced security tests, in the…Sébastien Palais18/12/2023
DORA: The Success of TLPTs, a Question of ROI for CISOs Threat-Led Penetration Testing (TLPT) costs DORA-regulated entities time and money. Let's take a look at…Sébastien Palais18/12/2023
Cybersecurity: the Challenge of Scaling Security Testing In this article, we'll first discuss the challenging issue of scaling security testing for modern…Sébastien Palais06/12/2023
Why It’s Time to Move on to Continuous Security Testing The need for a proactive, dynamic cybersecurity strategy has never been more pressing. It's time…Sébastien Palais04/12/2023
Case StudiesInterviews leboncoin: “Bug Bounty is our commitment to the hacking community” We spoke to Zakaria Rachid, CISO of leboncoin. He told us about the group's security,…Sébastien Palais28/08/2023