Skip to main content

Blog

26.Jun.2018
Outpost24 France
Only 57 percent of organisations patch vulnerabilities as soon as they are known. What about you?
04.Jun.2018
Sergio Loureiro, Director Cloud solutions
This blog post explains why your company has to migrate to the Cloud and how to be sure to protect your data properly. From Sergio Loureiro, Cloud Security Alliance co-founder.
28.May.2018
Outpost24
A recent study shows that IT security pros are struggling to keep up with the technologies that drive digital transformation. New technologies in connectivity and virtual infrastructure are helping companies to innovate supply chains and digitalize customer experiences. The new opportunities offered, however, come with a set of new security challenges in the form of an expanded attack surface. This is a double-edged sword, increasingly becoming a boardroom issue – how do companies keep up with the pace of innovation (and competition) while protecting their critical assets from security breaches?
24.Apr.2018
Nikos Danopoulos, IT Security Consultant
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It might allow attackers to read sensitive information, access configuration files or even execute system commands remotely.
09.Apr.2018
Outpost24 France
Cross Site Scripting, or XSS, is one of the most common type of vulnerabilities in web applications. Discover how to avoid Cross-Site Scripting attacks.
16.Mar.2018
Outpost24 France
Why carry out a cyber security risk assessment? Because company cybersecurity risks are increasing very fast when they haven't smart action plan.
12.Mar.2018
Outpost24
A vulnerability assessment is a risk management process used to identify, quantify and rank possible vulnerabilities to threats in a given system.
09.Feb.2018
Fernando Gallego, IT Security at Outpost24
In the digital age, web application penetration testing is one of the most critical elements of an organization’s vulnerability management program. In this blog post we will explain the role of penetration testing plays in protecting your organization against web-related exploitations
17.Jan.2018
Simon Roe, Product Manager at Outpost24
In this final blog entry covering OWASP we will address the three new entries, what they mean for organizations and the steps they should take to mitigate the risks they pose.
04.Jan.2018
Srinivasan Jayaraman, Vulnerability Research Manager
CPU bugs Meltdown and Spectre were discovered earlier this week which could allow hackers to read sensitive information stored in a system's memory. Find out what they are and what can be done about these widespread vulnerabilities

Looking for anything in particular?

Type your search word here