Thanks for trusting us!
We will contact you shortly.
In the meantime, you may be interested in purchasing some of our services:
-
Offer
Digital Research
regular price €1.980,00 EURregular priceUnit price / by€2.480,00 EUROffer price €1.980,00 EUROffer -
Pentesting: Internal Audit Service for Networks and Systems (Ethical Hacking)
regular price From €3.874,00 EURregular priceUnit price / by -
Implementation of the ISO 27001 Standard
regular price €5.265,00 EURregular priceUnit price / by -
Implementation of the National Security Scheme (ENS)
regular price €6.494,00 EURregular priceUnit price / by -
Identification of internal email fraud
regular price From €590,00 EURregular priceUnit price / by
Or read some of our latest articles:
See everything-
A10:2021 – Server-Side Request Forgery (SSRF)
Description The 'Server-Side Request Forgery' (SSRF) attack is a type of attack in which an attacker abuses the functionality of a server to make HTTP requests to internal resources or...
A10:2021 – Server-Side Request Forgery (SSRF)
Description The 'Server-Side Request Forgery' (SSRF) attack is a type of attack in which an attacker abuses the functionality of a server to make HTTP requests to internal resources or...
-
Zerolynx: reference in TLPT Tests - Red Team fo...
The DORA (Digital Operational Resilience Act) regulation, adopted by the European Union, establishes a regulatory framework to strengthen the digital operational resilience of financial entities,...
Zerolynx: reference in TLPT Tests - Red Team fo...
The DORA (Digital Operational Resilience Act) regulation, adopted by the European Union, establishes a regulatory framework to strengthen the digital operational resilience of financial entities,...
-
The ISO 27000 series: Beyond ISO 27001 and 27002
The ISO 27000 series is key to information security management, covering much more than the well-known ISO 27001. Standards such as ISO 27017 and 27018 strengthen security and privacy in...
The ISO 27000 series: Beyond ISO 27001 and 27002
The ISO 27000 series is key to information security management, covering much more than the well-known ISO 27001. Standards such as ISO 27017 and 27018 strengthen security and privacy in...
-
A05:2021 – Security misconfiguration
Introduction Vulnerability Description As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...
A05:2021 – Security misconfiguration
Introduction Vulnerability Description As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...