Aller au contenu principal

Blog (FR)

Discover our cybersecurity articles
mitre ATT&CK® framework

Using Mitre Att&CK with threat intelligence to improve Vulnerability Management

29.nov.2021

Read More
ghost labs

Alice in Windowsland: 3 ways to escalate privileges and steal credentials

01.oct.2021

Read More
OWASP Top 10 2021 image

OWASP Top 10 2021 is out - what's new and changed

24.sep.2021

Read More
PCI security standard

Joint PCI security and CSA guidance on scoping cloud environments

24.aoû.2021

Read More
Attack Surface for Insurance Applications cover

Mapping the Attack Surface for Insurance Applications

02.aoû.2021

Read More
zero trust architecture

Zero Trust Architecture (ZTA) within LEXIS

23.juin.2021

Read More
webinar ITV ciso conversation

ITV #CISO on building a security culture and managing risk

02.juin.2021

Read More
CIS version 8

What’s new and changed in CIS CSC version 8 – IG1

21.mai.2021

Read More
what is API security

What is API Security and how to protect them

20.mai.2021

Read More
mitigate Ransomware attacks

Comment atténuer les attaques de ransomware

18.mai.2021

Read More

Looking for anything in particular?

Type your search word here