The financial industry and digital operational resilience Digital operational resilience is a key issue for the financial sector, all the more so…Olivier Péquignot23/08/2023
How to protect industrial institutions from cyber threats? Connected industrial systems are prime targets for cyber attackers. What's at stake, and how can…Gorka Dronne22/08/2023
Software publishers: bet on Offensive Security Software publishers are prime targets for cyber-attackers. Investing in Offensive Security can be a real…Mehdi Bhih22/08/2023
Public sector: cyberthreats, challenges, and consequences Public services are a prime target for cyber-attackers, and the number of incidents reported is…Christophe Marnat07/07/2023
Bug Bounty: why and how to get started? Learn why and how you should get into bug bounty, whether you're a hacker or…Sébastien Palais04/07/2023
Bug bounty: benefits and drawbacks for cybersecurity A bug bounty program can do wonders for an organization's cybersecurity, but it's not a…Sébastien Palais04/07/2023
Bug Bounty: the differences between public and private platforms Learn how to choose the right bug bounty platform for your organization by exploring the…Sébastien Palais04/07/2023
NIS2 vs DORA: what differences and which legislation prevails? DORA and NIS2 are two major pieces of European cybersecurity legislation. Find out which one…Sébastien Palais20/06/2023
Industrial information system security: what’s at stake? At a time when Factories 4.0 are revolutionizing our industries, the security of industrial information…Gorka Dronne20/06/2023
All software publishers in France must now report vulnerabilities to the national authority France's 2023 Military Programming Law now requires all software publishers, including foreign ones, to report…Sébastien Palais15/06/2023