Menu

Why the SOC is essential for the protection of your data

In this post we explain how a SOC service can improve the security of your data and ensure compliance in the digital age

Read more
Ethical Hacking: What is it and how is it useful for cybersecurity?

What is ethical hacking and why does it play an important role in the strategy of CISOs and security technicians?

Read more
Cybersecurity for Telework: What should you know?

Can you ensure your IT security in and out of the office? Cybersecurity in teleworking should be your priority

Read more
Why is Microsoft a leader in security?

Why has Microsoft become a worldwide security benchmark company? In this post we tell you all the reasons why!

Read more
About disabling Basic Auth in Exchange Online

Did you know that on October 1, 2022, Basic Auth will be permanently deactivated for all tenant clients that are still using it ?

Read more
Creating a Rule in Microsoft Sentinel to Detect a ZuoRAT Malware Infection

 

We show you how to know if your device has been infected with the ZuoRat malware through an "Analytics Rules" query in Microsoft Sentinel. 

 

 

Read more
What should a SIEM and SOAR security analytics service include?

What features should a SIEM system have? What differentiates a traditional SIEM from a Cloud SIEM? We tell you all about it

Read more
Information security for Office 365 with Microsoft Defender

Learn all that Microsoft Defender for Office 365 can do - a holistic solution for preventing, protecting against and countering malicious attacks.

Read more
What is a SOC or Security Operations Center for?

Information security is a company's most vital asset and a SOC service will shield, analyze and prepare your systems against cyber-attacks.

 

 

 

Read more
What do you need to know about OSCP certification?

What is OSCP Certification and what does it mean in terms of IT security? How to obtain it and what should the applicant's profile be like? We tell you all about it!

Read more
Pentesting for dummies

In this article you will find out what a penetration analysis pentest is, what types there are, its phases and what differentiates it from a Red Team.

Read more
Enabling web content filtering in Microsoft Defender for Endpoint

Web content filtering is part of the web protection features in Microsoft Defender for Endpoint. Here's how to do it.

Read more