
Consulting
When you start to think about the development of an IT project you probably have questions about the issues and challenges related to the security of it....
Read moreWhen you start to think about the development of an IT project you probably have questions about the issues and challenges related to the security of it....
Read moreOWASP’s Application Security Verification Standard is an audit standard published and continuously updated by the OWASP Foundation. The goal of this project is to offer an open standard for testing applications environments and controls and offer a specific level of confidence in their security. Auditing a project using this standard ensures and proves that it follows a standardized and objectively evaluable set of requirements which do not depend on your auditor(s) but on the standard itself....
Read moreA PenTest is when an Ethical Hacker attempts to break into an information system (datacenter, servers, site or application) with the permission of the owner of that system. The purpose of this operation is to detect the vulnerabilities of the system and know if they can be exploited so that they can repair them before they can be exploited for malicious purposes....
Read moreHave your teams trained on the topics of IT security, in e-learning or face-to-face according to your needs. We offer training on various information security subjects, from introductions made for non-technical profiles to specific exploitation topics for seasoned computer scientists....
Read more