Resources

Find resources that help your company

Rules image

Criteria is a set of security requirements

It allows you to parametrize a pentest according to your organization's risk appetite

ESP
ESP

Fast Development while Preserving Security

How to Develop Products With Speed Without Sacrificing Security?

Webinar cover ESP

State of Attacks, Annual Report 2021

Get ideas on practices you can implement in your company to prevent attacks.

Webinar cover ESP

State of Attacks, Annual Report 2020

Discover ideas on practices you can adopt to protect your company against attacks.

Webinar cover ESP

Supported Languages, CI/CDs and Infrastructures

You can find here a list of languages and software we are able to work with.

ESP
ESP

Security for Users or Time-To-Market?

Learn about continuous deployment without compromising the security of your app.

ESP
ESP

When Is a Security Test Successful?

Elements of a successful testing strategy.

Webinar cover ESP

eBook: Hacking With Speed and Precision

Comprehensive guide on how to protect your company from attacks.

ENG
ENG

Continuous Hacking and Vulnerability Remediation

What data tells us about continuous hacking.

ESP
ESP

Continuous Hacking and Vulnerability Remediation

What data tells us about continuous hacking.

ESP
ESP

OWASP No Top 10: 190 Additional Vulnerabilities

Learn how you can go beyond the OWASP Top 10 in security testing.

ESP
ESP

Developing to Resist

How would our software look if agile constructions were the norm?

ENG
ENG

Elements of a Successful Testing Strategy

Support your decision-making regarding security testing on your systems.

ESP
ESP

Attacks on AWS Using Asserts OSS

Learn how to conduct an attack using Asserts to compromise an AWS account.