Blog HTTPCS Blog HTTPCS - The Blog of Cyber Security

  • Home
  • Cyber Security
    • All
    • News
    • Issues
    • Skills
    • Incidents
    • Risks & Threats
    Risks & Threats

    Security breach by Prompt Infection affects generative AIs like ChatGPT and Google…

    Cyber Security

    Our 10 cybersecurity recommendations

    Risks & Threats

    Ransomware-as-a-Service (RaaS)

    Prev Next
  • Tools
    • All
    Tools

    File Integrity Monitoring

    Cyber Security

    How to protect yourself against email spoofing with SPF, DKIM or DMARC?

    Tools

    SSL certificates maximum validity period has been reduced to one year

    Prev Next
  • Legal
    • All
    • GDPR
    • Generalities
    Legal

    Digital Services Act (DSA)

    Legal

    Digital Operational Resilience Act (DORA)

    Cyber Security

    The CYBER-SCORE law : a major step forward in assessing the security of websites

    Prev Next
  • Contact Us
  • Français
HTTPCS Blog
  • Home
  • Elodie DELANNOY

Author

Elodie DELANNOY

Cyber Security

The effects of a dysfunctional website

Elodie DELANNOY Aug 14, 2019 0
Who has never been annoyed by a webpage which takes too long to display, or even a never-ending time to load. You…
Cyber Security

How does AI come to the rescue of cybersecurity?

Elodie DELANNOY Aug 1, 2019 0
When you know about robots, do you imagine people from the future driving flying cars? Now artificial intelligence…
Cyber Security

Pentesting: how does it work?

Elodie DELANNOY Jul 10, 2019 0
In the cybersecurity world, we often talk about carrying out audits and regular "penetration tests". If this…
  • Facebook Follow
  • Twitter Follow
  • Linkedin Follow
  • RSS Follow
  • Français
  • English
  • Legal Notices
  • Privacy Policy
  • Contact Us
© HTTPCS 2018 - All Rights Reserved.
  • Home
  • Cyber Security
    • All
    • News
    • Issues
    • Skills
    • Incidents
    • Risks & Threats
    Risks & Threats

    Security breach by Prompt Infection affects generative AIs like ChatGPT and Google…

    Cyber Security

    Our 10 cybersecurity recommendations

    Risks & Threats

    Ransomware-as-a-Service (RaaS)

    Prev Next
  • Tools
    • All
    Tools

    File Integrity Monitoring

    Cyber Security

    How to protect yourself against email spoofing with SPF, DKIM or DMARC?

    Tools

    SSL certificates maximum validity period has been reduced to one year

    Prev Next
  • Legal
    • All
    • GDPR
    • Generalities
    Legal

    Digital Services Act (DSA)

    Legal

    Digital Operational Resilience Act (DORA)

    Cyber Security

    The CYBER-SCORE law : a major step forward in assessing the security of websites

    Prev Next
  • Contact Us
  • Français