Case StudiesInterviews Secure Before You Deploy: How Sopra Steria Combines Pentests and Bug Bounty for Greater Agility In an era of accelerating digital transformation, cybersecurity concerns are shifting to the beginning of…Mélissa Quix11/09/2025
Case StudiesInterviews Comment un acteur européen incontournable du e-commerce renforce sa cybersécurité avec le Bug Bounty Avec des dizaines de millions de membres, 7 000 marques partenaires et un chiffre d’affaires…Mélissa Quix11/09/2025
Why CVEs and Automated Scanners Are Insufficient to Prioritize Your Security Operations With the exponential growth in volume and sophistication of cyberattacks, further fueled by AI, organizations…Ali Bawazeer14/03/2025
DORA: Everything About Threat-Led Penetration Testing (TLPT) Some entities regulated by DORA are required to carry out enhanced security tests, in the…Sébastien Palais27/01/2025
DORA: The Challenge of Scaling Security Testing Scaling security testing is a major challenge for DORA-regulated entities. Let's explore concrete solutions for…Sébastien Palais22/01/2025
Cyber Resilience Act (CRA): Step-By-Step Guide to Compliance Need a compliance guide for the Cyber Resilience Act (CRA)? Here's a 15-step roadmap to…Sébastien Palais21/12/2024
NIS2 Directive: Step-by-Step Guide to Compliance Looking for an in-depth guide to NIS2 compliance? We've gone through the legislation and created…Sébastien Palais18/12/2024
DORA and the Digital Operational Resilience Testing Program Find out all there is to know about the digital operational resilience testing program, a…Sébastien Palais10/12/2024
DORA: A Guide to Security Testing for Regulated Entities Speed up your DORA compliance with this four-chapter guide to security testing requirements for entities…Sébastien Palais15/11/2024
DORA: A Complete Guide to Compliance for the Financial Sector Looking for a practical guide to DORA compliance? Here's a 17-point checklist to get you…Sébastien Palais12/10/2024