Cybersecurity: the Challenge of Scaling Security Testing In this article, we'll first discuss the challenging issue of scaling security testing for modern…Sébastien Palais06/12/2023
Why It’s Time to Move on to Continuous Security Testing The need for a proactive, dynamic cybersecurity strategy has never been more pressing. It's time…Sébastien Palais04/12/2023
Case StudiesInterviews leboncoin: “Bug Bounty is our commitment to the hacking community” We spoke to Zakaria Rachid, CISO of leboncoin. He told us about the group's security,…Sébastien Palais28/08/2023
Bug Bounty: why and how to get started? Learn why and how you should get into bug bounty, whether you're a hacker or…Sébastien Palais04/07/2023
Bug bounty: benefits and drawbacks for cybersecurity A bug bounty program can do wonders for an organization's cybersecurity, but it's not a…Sébastien Palais04/07/2023
Bug Bounty: the differences between public and private platforms Learn how to choose the right bug bounty platform for your organization by exploring the…Sébastien Palais04/07/2023
All software publishers in France must now report vulnerabilities to the national authority France's 2023 Military Programming Law now requires all software publishers, including foreign ones, to report…Sébastien Palais15/06/2023
What is Attack Surface Management? (tools, strategy, guidelines) Cybersecurity loves its fancy words, and you're in for a treat! ASM, DRPs, EASM, CAASM,…Sébastien Palais23/05/2023
Case Studies Ethical hackers test security of French online proxy voting service Yogosha's ethical hackers have tested the security of MaProcuration, the digital proxy voting system of…Sébastien Palais10/05/2023
Case StudiesInterviews Paris Aéroport: Hackers to test airport equipment cybersecurity Groupe ADP called on Yogosha and its hackers to test the cybersecurity of airport equipment.…Sébastien Palais02/05/2023