Publications

Security analysis with logging

Knowing the offensive techniques is the best way to protect yourself from computer attacks. In the field of #cybersecurity, an excellent logging allows collecting a lot of information on the techniques used during the attempts. The analysis of intrusion attempts, injection and information gathering is essential to defend a computer system. In this publication, we discuss log analysis concepts with concrete examples as a way to raise awareness of cybersecurity.

Read

Sanitize Wordpress functions

The use of #Wordpress is very widespread. Today, anyone can create a personalized #siteweb in a few clicks for a small fee, but at what price? To answer this question, it is important to understand the life cycle of #data in Wordpress and thus avoid certain #security holes by using sanitize functions of Wordpress. This publication is more for #developers, but can be understood by most of Wordpress users.

Read