Bug Hunters: 4 Paths to Join the Yogosha Strike Force Security researchers can now join the Yogosha Strike Force (YSF) via four selection paths: skills,…Yogosha02/02/2024
DORA: The Success of TLPTs, a Question of ROI for CISOs Threat-Led Penetration Testing (TLPT) costs DORA-regulated entities time and money. Let's take a look at…Sébastien Palais18/12/2023
Integration Testing: Checking That an App Is Working Properly In this article, you'll learn what integration testing is, and how to integrate it into…Florian Seigle-Vatte07/12/2023
Cybersecurity: the Challenge of Scaling Security Testing In this article, we'll first discuss the challenging issue of scaling security testing for modern…Sébastien Palais06/12/2023
Why It’s Time to Move on to Continuous Security Testing The need for a proactive, dynamic cybersecurity strategy has never been more pressing. It's time…Sébastien Palais04/12/2023
Product Security Checklist by Yogosha: Standardized Pentests to Ensure Compliance Launching a pentest with Yogosha is intended to be seamless, allowing for end-to-end, agile security…Stéphane Saint-Denis30/11/2023
Construction Industry: How to Cope with Increasing Cyber Risks? What cyber threats is the construction industry facing? What are the challenges facing the construction…Gorka Dronne23/11/2023
Public Sector and Cybersecurity: Why Invest? How much does a security policy cost the public sector? Does heavy investment really pay…Christophe Marnat22/11/2023
Software publishers: what costs and ROI for cybersecurity? How much does a cybersecurity policy cost? Is the ROI sufficient? Above all, are software…Mehdi Bhih25/10/2023
Smart Factory: cybersecurity challenges in Industry 4.0 Why is the industrial sector particularly affected by cyber risk? And what are the consequences…Gorka Dronne25/10/2023