Resources

Find resources that help your company

Rules image

Criteria is a set of security requirements

It allows you to parametrize a pentest according to your organization's risk appetite

ESP

Fast Development while Preserving Security

How to Develop Products With Speed Without Sacrificing Security?

Webinar cover ESP

State of Attacks, Annual Report 2021

Get ideas on practices you can implement in your company to prevent attacks.

Webinar cover ESP

State of Attacks, Annual Report 2020

Discover ideas on practices you can adopt to protect your company against attacks.

Webinar cover ESP

Supported Languages, CI/CDs and Infrastructures

resources.report3Description

ESP

Security for Users or Time-To-Market?

Learn about continuous deployment without compromising the security of your app.

ESP

When Is a Security Test Successful?

Elements of a successful testing strategy.

Webinar cover ESP

eBook: Hacking With Speed and Precision

Comprehensive guide on how to protect your company from attacks.

ENG

Continuous Hacking and Vulnerability Remediation

What data tells us about continuous hacking.

ESP

Continuous Hacking and Vulnerability Remediation

What data tells us about continuous hacking.

ESP

OWASP No Top 10: 190 Additional Vulnerabilities

Learn how you can go beyond the OWASP Top 10 in security testing.

ESP

Developing to Resist

How would our software look if agile constructions were the norm?

ENG

Elements of a Successful Testing Strategy

Support your decision-making regarding security testing on your systems.

ESP

Attacks on AWS Using Asserts OSS

Learn how to conduct an attack using Asserts to compromise an AWS account.