Aller au contenu principal

Blog (FR)

07.nov.2019
John Stock, Network Security Manager Outpost24
Outpost24 recognized among Vulnerability Risk Management vendors by analyst
23.oct.2019
Hugo van den Toorn, Manager Offensive Security at Outpost24
In this blog I will share why we use hardware implants for our Red teaming and physical penetration tests, how they work and how we make them.
19.sep.2019
Sergio Loureiro, Cloud Security Director
Check out our interactive infographic of the top 10 cloud security myths and common misconceptions.

10.sep.2019
By Sergio Loureiro, Product Manager Outpost24
While the idea of a Shared Responsibility Model is conceptually understood, organizations taking advantage of the transformative power of public cloud platforms continue to come short practically, of the implementation of basic security controls, giving hackers a one-way ticket to their critical assets and data.
19.aoû.2019
Outpost24
We understand that vulnerability detection is time critical and can impact how vulnerabilities are managed. To improve zero-day detection, organizations can use a vulnerability management solution to improve the time from detection to fixing a critical vulnerability by utilizing specialist intelligence and tools.
07.aoû.2019
Jonas Mattsson, Ghost Labs
This post explains how the vulnerabilities in Oracle Webcenter Site were found and how they can be exploited.
23.juil.2019
Davey Winder, security journalist
A Continuous Adaptive Risk and Trust Assessment (CARTA) approach to your security posture may not be a new thing, Gartner formalized the idea two years ago at its 2017 security summit, but neither is it an advisable one: it’s absolutely essential for organizations to adopt agile security
15.juil.2019
Bob Egner, Head of Product
Check out our interactive infographic to see how your peers are managing their application and cloud security
03.juil.2019
Simon Roe, Product Manager Outpost24
Penetration testing, or pen tests, can be a confusing subject and the costs can sometimes spiral beyond what you originally budgeted for without adding value. So, is application pen testing an effective way of keeping your critical applications protected or should you look at exploring other options?

There are security experts who insist penetration testing is essential for application security, and you leave yourself open to BIG risks if you don’t do it regularly. However, not knowing the entire end to end process can be a major stumbling block to getting the best value and, crucially, could have a big impact on your bottom line and overall business security.
13.mai.2019
Davey Winder, security journalist
There can be no doubting that the cloud is no longer the future but rather the present for an ever-increasing number of organizations. Driven by factors such as digital transformation, operational efficiency, agility and cost savings, the cloud has proved to be something of a business no-brainer.

Looking for anything in particular?

Type your search word here