The 10 most popular cyberattacks used against companies Soukaina OUHAJJI Jan 29, 2020 0 Cyber Security Do you know the most common cyberattacks and do you know how to protect yourself from them?
Third-party cookies banished on Google Chrome Nicolas GUZMAN-SCOLA Jan 21, 2020 0 Cyber Security Google intends to get rid of third-party cookies on its Chrome browser. Is that good news for users? You'll find…
Eight tools to secure your e-shop Soukaina OUHAJJI Oct 28, 2019 0 Cyber Security Eight essential tools to secure an e-shop website.
The effects of a dysfunctional website Elodie DELANNOY Aug 14, 2019 0 Cyber Security Who has never been annoyed by a webpage which takes too long to display, or even a never-ending time to load. You…
How does AI come to the rescue of cybersecurity? Elodie DELANNOY Aug 1, 2019 0 Cyber Security When you know about robots, do you imagine people from the future driving flying cars? Now artificial intelligence…
Pentesting: how does it work? Elodie DELANNOY Jul 10, 2019 0 Cyber Security In the cybersecurity world, we often talk about carrying out audits and regular "penetration tests". If this…
Why should my company carry out security audits on a regular basis? Samy SEGHIER Jun 19, 2019 0 Cyber Security The best way to guarantee a perfect security of your infrastructures is to frequently carry out security audits.…
The NIS Directive : everything explained Nicolas GUZMAN-SCOLA May 17, 2019 0 Legal The NIS directive imposes heavy cybersecurity obligations for some organizations. What are these obligations and…
HTTPCS is participates in the 11th edition of the FIC. Come and meet us. Marie CHOLLET Dec 20, 2018 0 News As the European leader in offensive cyber security, HTTPCS is honoured to participate in the International!-->…
Why use a website monitoring tool? Marie CHOLLET Nov 21, 2018 0 Tools The unavailability of a website such as a server failure or an HTTP error can have serious consequences for a…