P.O.TECHBypassing EPP — Chapter 3Evading endpoint security requires several steps and leverages numerous tools that allow to carry out ample sophisticated attacks, on…Nov 12, 2020Nov 12, 2020
P.O.TECHBypassing EPP — Chapter 2The term malware is the contraction of “malicious software”. It designates any program or software specifically designed or modified to…Sep 17, 2020Sep 17, 2020
P.O.TECHFuites d’infos sur le Dark WebSecteurs pharmaceutique et agroalimentaire en FranceSep 7, 2020Sep 7, 2020
P.O.TECHGDPR: a year laterThe General Data Protection Regulation (GDPR) came into force on 25th May 2018 to reinforce data protection while also providing enhanced…Sep 1, 2020Sep 1, 2020
P.O.TECHCybersecurity: A global approach must be takenIn terms of cybersecurity, all indicators show that threats are increasing because of the “All digital, All connected” transformation. We…Sep 1, 2020Sep 1, 2020
P.O.TECHRansomware celebrates its 30th yearIn May 2017, the WannaCry attack has touched nearly 300,000 computers across 150 countries and has been ranked the most widespread malware…Sep 1, 2020Sep 1, 2020
P.O.TECHBypassing EPP — Chapter 1Cybersecurity is not just one operation that would be always threatened. Cybersecurity is a continuous process, which must be integrated…Aug 25, 2020Aug 25, 2020