P.O.TECHBypassing EPP — Chapter 3Evading endpoint security requires several steps and leverages numerous tools that allow to carry out ample sophisticated attacks, on…5 min read·Nov 12, 2020----
P.O.TECHBypassing EPP — Chapter 2The term malware is the contraction of “malicious software”. It designates any program or software specifically designed or modified to…5 min read·Sep 17, 2020----
P.O.TECHFuites d’infos sur le Dark WebSecteurs pharmaceutique et agroalimentaire en France4 min read·Sep 7, 2020----
P.O.TECHGDPR: a year laterThe General Data Protection Regulation (GDPR) came into force on 25th May 2018 to reinforce data protection while also providing enhanced…4 min read·Sep 1, 2020----
P.O.TECHCybersecurity: A global approach must be takenIn terms of cybersecurity, all indicators show that threats are increasing because of the “All digital, All connected” transformation. We…4 min read·Sep 1, 2020----
P.O.TECHRansomware celebrates its 30th yearIn May 2017, the WannaCry attack has touched nearly 300,000 computers across 150 countries and has been ranked the most widespread malware…3 min read·Sep 1, 2020----
P.O.TECHBypassing EPP — Chapter 1Cybersecurity is not just one operation that would be always threatened. Cybersecurity is a continuous process, which must be integrated…6 min read·Aug 25, 2020----