![](https://www.tarlogic.com/wp-content/themes/Avada-Child-Theme/images/cyber-for-all_s.webp)
Cyber for all - Page 10
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
![OWASP: Top 10 Web Application Vulnerabilities](https://www.tarlogic.com/wp-content/uploads/2022/05/OWAS1-1.jpg)
OWASP: Top 10 Web Application Vulnerabilities
Web applications are part of our daily lives. We use and consult them at work and home, for information and entertainment. Their use has become so widespread that they have become [...]
Read more![Red Team: The power of offensive security](https://www.tarlogic.com/wp-content/uploads/2022/05/RT1-1.jpg)
Red Team: The power of offensive security
Red Team uses offensive security to help organizations detect vulnerabilities and protect against malicious attacks[...]
Read more![How to get the most out of the Internet using WiFi Planning](https://www.tarlogic.com/wp-content/uploads/2022/04/Wifi-planning.jpg)
How to get the most out of the Internet using WiFi Planning
Thanks to tools such as WiFi Planning, making the most of the network is within reach of any organization WiFi sustains the world. In just a few decades, this technology has comple[...]
Read more![A practical guide to understanding social engineering attacks](https://www.tarlogic.com/wp-content/uploads/2022/04/social-engineering-1.jpg)
A practical guide to understanding social engineering attacks
There are movie tunes that have become so widespread in the collective imagination that one can recognize them even if one has not seen the movie to which they belong. That is the [...]
Read more![PCI DSS security audit: don’t let your card be stolen](https://www.tarlogic.com/wp-content/uploads/2022/03/PCI-audit-1.jpg)
PCI DSS security audit: don’t let your card be stolen
The PCI DSS security audit is used to verify that technical security controls protect credit and debit cardholder data[...]
Read more![Ethical hacking: attacking to improve](https://www.tarlogic.com/wp-content/uploads/2022/03/hacking-2.jpg)
Ethical hacking: attacking to improve
To optimize the cyber defenses of any company, it's essential to use services that meet the ideals and objectives of ethical hacking[...]
Read more![Red Team, the soldiers of the TIBER-EU program](https://www.tarlogic.com/wp-content/uploads/2022/02/TIBER-EU-Red-Team.jpg)
Red Team, the soldiers of the TIBER-EU program
The TIBER-EU program requires Red Team services to simulate threats to financial institutions and discover their weaknesses and vulnerabilities.[...]
Read more![TIBER-EU calls on cyber intelligence to arm banks](https://www.tarlogic.com/wp-content/uploads/2022/02/cyber-intelligence-TIBER-EU.jpg)
TIBER-EU calls on cyber intelligence to arm banks
The TIBER-EU community project will test the cybersecurity structures of stock exchanges, banks, and community institutions. Cyber intelligence services will design attack scenario[...]
Read more![TIBER-EU, time to close the cybersecurity overdraft](https://www.tarlogic.com/wp-content/uploads/2022/01/TIBER-EU-EN.jpg)
TIBER-EU, time to close the cybersecurity overdraft
The ECB has decided to strengthen the cybersecurity of banks through the TIBER-EU project in view of the growing number of cyberattacks on financial institutions[...]
Read more![CIS controls: best practices in cyber security](https://www.tarlogic.com/wp-content/uploads/2022/01/CIS-benchmarks.jpg)
CIS controls: best practices in cyber security
CIS controls and benchmarks provide IT staff and security analysts around the world with a set of tips and methodologies to ensure good cybersecurity practices and reduce risks on [...]
Read more