Christmas CTF 2022: Winners & numbers! HO HO HO HUNTERS! Yogosha’s Christmas CTF is over, and it’s time to announce the…Yogosha30/12/2022
Case StudiesInterviews Terega: addressing cybersecurity challenges in the energy sector Focus on Teréga. A model of digital security in the energy industry, where cybersecurity challenges…Sébastien Palais19/12/2022
Penetration Test vs Bug Bounty: which approach is right for you? Bug bounty and penetration testing are two complementary approaches to security testing. Find out which…Sébastien Palais13/12/2022
Pentest as a Service vs traditional pentesting, which differences? What are the practical differences between conventional pentesting and Penetration Testing as a Service (PtaaS)?…Sébastien Palais24/11/2022
Penetration testing: why and how to conduct a pentest A penetration test identifies vulnerabilities by simulating an attack by hackers. Tools, types of pentests,…Sébastien Palais24/11/2022
SIGMA Rules: how to standardize detections for any SIEM SIGMA rules are a great collaborative tool for SOC teams. They allow to standardize the…Sébastien Palais17/11/2022
Case StudiesInterviews Veepee: behind the pink logo, a model of digital security Veepee's CISO and Lead OffSec told us about the tight security of this e-commerce giant.…Sébastien Palais03/11/2022
Company News Yogosha and LOGON bring the VOC to Asia Yogosha joins hands with LOGON Software, a cyber security solutions provider, to launch the Vulnerability…Yogosha26/10/2022
Interviews Hunter Talks: meet Mohammed Aloraimi, aka ixSly Mohammed Aloraimi, also known as ixSly, is a Cyber Team Leader from the UAE and…Sébastien Palais25/10/2022
NIS2 Directive: Step-by-Step Guide to Compliance Looking for an in-depth guide to NIS2 compliance? We've gone through the legislation and created…Sébastien Palais18/10/2022