by Alexander | 4 November 2024
A pentest is an intrusion test carried out by a cybersecurity expert (known as a pentester or ethical hacker) who attempts to infiltrate an organisation's computer system to detect exploitable security flaws.
The aim is to assess the robustness of defences and correct vulnerabilities before they are exploited by real hackers.
by Alexander | 4 November 2024
A pentester is a cybersecurity expert whose job is to simulate computer attacks on information systems in order to identify vulnerabilities. They use their skills in a legal and authorised manner to test and improve the security of IT systems.
It's also known as ethical hacking.
by Alexander | 8 October 2024
A business continuity plan (BCP) is a strategic document that describes the measures to be implemented to maintain a company's essential activities in the event of a crisis or major incident (cyber attack, natural disaster, etc.).
by Alexander | 8 October 2024
Disaster Recovery Plan (DRP) is a detailed document that describes the procedures and actions to be implemented to enable an organisation to resume its critical activities as quickly as possible following a major IT security incident. This incident can take various forms: cyber attack, hardware failure, natural disaster, etc.
by Alexander | 8 October 2024
The ISSP (Information Systems Security Policy) is a strategic document that defines the rules and objectives of an organisation in terms of the security of its information systems.