Bug Bounty: why and how to get started? Learn why and how you should get into bug bounty, whether you're a hacker or…Sébastien Palais04/07/2023
Bug bounty: benefits and drawbacks for cybersecurity A bug bounty program can do wonders for an organization's cybersecurity, but it's not a…Sébastien Palais04/07/2023
Bug Bounty: the differences between public and private platforms Learn how to choose the right bug bounty platform for your organization by exploring the…Sébastien Palais04/07/2023
NIS2 vs DORA: what differences and which legislation prevails? DORA and NIS2 are two major pieces of European cybersecurity legislation. Find out which one…Sébastien Palais20/06/2023
All software publishers in France must now report vulnerabilities to the national authority France's 2023 Military Programming Law now requires all software publishers, including foreign ones, to report…Sébastien Palais15/06/2023
What is Attack Surface Management? (tools, strategy, guidelines) Cybersecurity loves its fancy words, and you're in for a treat! ASM, DRPs, EASM, CAASM,…Sébastien Palais23/05/2023
Case Studies Ethical hackers test security of French online proxy voting service Yogosha's ethical hackers have tested the security of MaProcuration, the digital proxy voting system of…Sébastien Palais10/05/2023
Case StudiesInterviews Paris Aéroport: Hackers to test airport equipment cybersecurity Groupe ADP called on Yogosha and its hackers to test the cybersecurity of airport equipment.…Sébastien Palais02/05/2023
What is Offensive Security? An introductory guide to OffSec Pentesting, ethical hacking, certifications... Let's take a closer look at Offensive Security, or OffSec, an…Sébastien Palais20/04/2023
DORA: A Complete Guide to Compliance for the Financial Sector Looking for a practical guide to DORA compliance? Here's a 17-point checklist to get you…Sébastien Palais08/03/2023