Bug bounty and penetration testing are two complementary approaches to security testing. Find out which…

Sébastien Palais13/12/2022
What are the practical differences between conventional pentesting and Penetration Testing as a Service (PtaaS)?…

Sébastien Palais24/11/2022
A penetration test identifies vulnerabilities by simulating an attack by hackers. Tools, types of pentests,…

Sébastien Palais24/11/2022
SIGMA rules are a great collaborative tool for SOC teams. They allow to standardize the…

Sébastien Palais17/11/2022
Veepee's CISO and Lead OffSec told us about the tight security of this e-commerce giant.…

Sébastien Palais03/11/2022
Yogosha joins hands with LOGON Software, a cyber security solutions provider, to launch the Vulnerability…
Yogosha26/10/2022
Mohammed Aloraimi, also known as ixSly, is a Cyber Team Leader from the UAE and…

Sébastien Palais25/10/2022
Looking for an in-depth guide to NIS2 compliance? We've gone through the legislation and created…

Sébastien Palais18/10/2022