Why It’s Time to Move on to Continuous Security Testing The need for a proactive, dynamic cybersecurity strategy has never been more pressing. It's time…Sébastien Palais04/12/2023
Product Security Checklist by Yogosha: Standardized Pentests to Ensure Compliance Launching a pentest with Yogosha is intended to be seamless, allowing for end-to-end, agile security…Stéphane Saint-Denis30/11/2023
Construction Industry: How to Cope with Increasing Cyber Risks? What cyber threats is the construction industry facing? What are the challenges facing the construction…Gorka Dronne23/11/2023
Public Sector and Cybersecurity: Why Invest? How much does a security policy cost the public sector? Does heavy investment really pay…Christophe Marnat22/11/2023
Software publishers: what costs and ROI for cybersecurity? How much does a cybersecurity policy cost? Is the ROI sufficient? Above all, are software…Mehdi Bhih25/10/2023
Smart Factory: cybersecurity challenges in Industry 4.0 Why is the industrial sector particularly affected by cyber risk? And what are the consequences…Gorka Dronne25/10/2023
Financial sector and cybersecurity: is it worth investing? How much does a cyber-attack cost? What are the consequences for the company? Is implementing…Olivier Péquignot25/10/2023
InfoSec in the public sector: 7 best practices The public sector is facing an increasing number of cyber-attacks. Discover 7 best practices to…Christophe Marnat25/10/2023
What is Unit Testing: explanation, examples and methodology In web development, Unit Testing plays a key role in guaranteeing the quality and reliability…Evan Juge20/09/2023
Case StudiesInterviews leboncoin: “Bug Bounty is our commitment to the hacking community” We spoke to Zakaria Rachid, CISO of leboncoin. He told us about the group's security,…Sébastien Palais28/08/2023