Penetration testing: why and how to conduct a pentest A penetration test identifies vulnerabilities by simulating an attack by hackers. Tools, types of pentests,…Sébastien Palais24/11/2022
SIGMA Rules: how to standardize detections for any SIEM SIGMA rules are a great collaborative tool for SOC teams. They allow to standardize the…Sébastien Palais17/11/2022
Case StudiesInterviews Veepee: behind the pink logo, a model of digital security Veepee's CISO and Lead OffSec told us about the tight security of this e-commerce giant.…Sébastien Palais03/11/2022
Company News Yogosha and LOGON bring the VOC to Asia Yogosha joins hands with LOGON Software, a cyber security solutions provider, to launch the Vulnerability…Yogosha26/10/2022
Interviews Hunter Talks: meet Mohammed Aloraimi, aka ixSly Mohammed Aloraimi, also known as ixSly, is a Cyber Team Leader from the UAE and…Sébastien Palais25/10/2022
Hunters Survival Game #2: Winners & Numbers (Infographic) On September 1st, hackers of our Top 100 2022 were invited to compete for the…Yogosha30/09/2022
Case StudiesInterviews Security in MLOps done right: meet Arize’s CISO Arize AI is a U.S.-based company specializing in machine learning observability. Its platform tracks hundreds…Sébastien Palais30/09/2022
DevSecOps: 3 Practical Steps to Improve your Security We won't talk about the theory of DevSecOps, but rather about tips and concrete ways…Yogosha23/09/2022
What is a Vulnerability Operations Center (VOC)? The Vulnerability Operations Center is a platform. One that allows customers to combine three elements…Yassir Kazar21/09/2022
Company News Yogosha gets a fresh start: discover our Offensive Security Testing Platform New logo. New website. New product. New Yogosha. Yogosha is about to turn 6, and…Yogosha17/09/2022