OSINT 101: Understanding OSINT, its tools, benefits and risks OSINT is an essential part of information gathering. In this article, we'll look at what…Sébastien Palais13/02/2023
EDR Security: What is it, and how to choose your EDR solution? In this article, you'll learn what Endpoint Detection and Response (EDR) security is, what it's…Sébastien Palais23/01/2023
Bug Bounty: the ultimate guide to a successful program Thinking of getting into bug hunting, but unsure of where to start? Hackers, scope, triage……Sébastien Palais10/01/2023
Interviews Meet vraj: “I hacked an airline and won miles, now I could travel for free” vraj is a security researcher. We spoke about what makes a good hunter, how to…Sébastien Palais04/01/2023
Case StudiesInterviews Terega: addressing cybersecurity challenges in the energy sector Focus on Teréga. A model of digital security in the energy industry, where cybersecurity challenges…Sébastien Palais19/12/2022
Penetration Test vs Bug Bounty: which approach is right for you? Bug bounty and penetration testing are two complementary approaches to security testing. Find out which…Sébastien Palais13/12/2022
Pentest as a Service vs traditional pentesting, which differences? What are the practical differences between conventional pentesting and Penetration Testing as a Service (PtaaS)?…Sébastien Palais24/11/2022
Penetration testing: why and how to conduct a pentest A penetration test identifies vulnerabilities by simulating an attack by hackers. Tools, types of pentests,…Sébastien Palais24/11/2022
SIGMA Rules: how to standardize detections for any SIEM SIGMA rules are a great collaborative tool for SOC teams. They allow to standardize the…Sébastien Palais17/11/2022
Case StudiesInterviews Veepee: behind the pink logo, a model of digital security Veepee's CISO and Lead OffSec told us about the tight security of this e-commerce giant.…Sébastien Palais03/11/2022