Skip to main content

Blog

01.Aug.2018
Sergio Loureiro, Director Cloud solutions
What about our patented Clone&Scan technology? Discover a new approach for Vulnerability Scanning: the Clone Wars!
27.Jul.2018
Outpost24 France
With digital transformation, a lot of companies invest and add layers of technology to their business using DevOps, Cloud and web applications for example. And with the DevOps approach always pushing to improve apps, security remain one of the companies' biggest challenge.  
25.Jul.2018
Application security is evolving but it has yet to catch up with the abundance of risks that web applications now present. Threats to web apps are becoming an even greater challenge for DevOps on a near daily basis and many businesses are still using risk management plans that simply do not cut it.
17.Jul.2018
Outpost24 France
Web application vulnerabilities are some of the most common flaws leading to modern data breaches. SQL injection (SQLi) and Local File Inclusion (LFI) attacks represented for 85% of Web Application attacks, XSS counted for only 9%.
05.Jul.2018
Sergio Loureiro, Director Cloud solutions
Every big cloud event brings dozens of new cloud services. Every morning marketing launches enhancements or new cloud services. Do you have the same feeling?
26.Jun.2018
Outpost24 France
Only 57 percent of organisations patch vulnerabilities as soon as they are known. What about you?
04.Jun.2018
Sergio Loureiro, Director Cloud solutions
This blog post explains why your company has to migrate to the Cloud and how to be sure to protect your data properly. From Sergio Loureiro, Cloud Security Alliance co-founder.
28.May.2018
Outpost24
A recent study shows that IT security pros are struggling to keep up with the technologies that drive digital transformation. New technologies in connectivity and virtual infrastructure are helping companies to innovate supply chains and digitalize customer experiences. The new opportunities offered, however, come with a set of new security challenges in the form of an expanded attack surface. This is a double-edged sword, increasingly becoming a boardroom issue – how do companies keep up with the pace of innovation (and competition) while protecting their critical assets from security breaches?
24.Apr.2018
Nikos Danopoulos, IT Security Consultant
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It might allow attackers to read sensitive information, access configuration files or even execute system commands remotely.
09.Apr.2018
Outpost24 France
Cross Site Scripting, or XSS, is one of the most common type of vulnerabilities in web applications. Discover how to avoid Cross-Site Scripting attacks.

Looking for anything in particular?

Type your search word here