Bug bounty and penetration testing are two complementary approaches to security testing. Find out which…
Sébastien Palais13/12/2022
What are the practical differences between conventional pentesting and Penetration Testing as a Service (PtaaS)?…
Sébastien Palais24/11/2022
A penetration test identifies vulnerabilities by simulating an attack by hackers. Tools, types of pentests,…
Sébastien Palais24/11/2022
SIGMA rules are a great collaborative tool for SOC teams. They allow to standardize the…
Sébastien Palais17/11/2022
Veepee's CISO and Lead OffSec told us about the tight security of this e-commerce giant.…
Sébastien Palais03/11/2022
Yogosha joins hands with LOGON Software, a cyber security solutions provider, to launch the Vulnerability…
Yogosha26/10/2022
Mohammed Aloraimi, also known as ixSly, is a Cyber Team Leader from the UAE and…
Sébastien Palais25/10/2022



