Blog HTTPCS - The Blog of Cyber Security
Shadow IT
Security breach by Prompt Infection affects generative AIs like ChatGPT and Google…
Our 10 cybersecurity recommendations
File Integrity Monitoring
How to protect yourself against email spoofing with SPF, DKIM or DMARC?
SSL certificates maximum validity period has been reduced to one year
Digital Services Act (DSA)
Digital Operational Resilience Act (DORA)
The CYBER-SCORE law : a major step forward in assessing the security of websites
Discover contributors and authors who created articles on this blog of cyber security.
Thanks to them !