Shadow IT, the blind spot of IT security

Shadow IT, the blind spot of IT security Julien 23 janvier 2025 Awareness and resources, Not classified What is shadow IT ? Shadow IT, also known as shadow computing, parallel computing or rogue IT, is the practice of using technologies (software, SaaS platforms, hardware or other resources) without the knowledge or approval of a company […]
The threat of typosquatting

The threat of typosquatting Julien 22 janvier 2025 Non classé Have you ever typed in the URL of a website you know well, only to come across a completely unexpected, even suspicious, page? It could be that the site you were hoping to visit has fallen victim to a typosquatting attack. In this article, we’ll […]
EASM – External attack surface management: what are we talking about ?

EASM – External attack surface management: what are we talking about? Nancy 22 janvier 2025 Non classé Over the past decade, organizations have considerably increased their exposure surface, notably through the digitization of services and the use of cloud providers. For example, they have multiplied the number of public IP addresses to facilitate exchanges between […]