The group
Squad
Scassi
Contact
Let's get acquainted
Let's get acquainted
The Squad Group
Discover the SquadSpirit
Our latest news
Press
Our agencies
Join us!
Join us!
Our job offers Squad Group
Unsolicited application
Our expertise
Our expertise
Governance, Risk, and Compliance
Operational Cybersecurity
IT & Cloud Security
Access Control
OT, IoT, and Embedded Security
AI & DevSecOps
Digital sovereignty
The SquadXpert Blog
Partners
Partners
Discover all our partners
BeyondTrust
CyberArk
F5
Forescout
Fortinet
Illumio
Mimecast
Netskope
Palo Alto Networks
Versa Networks
Wiz
CSR
Squad UP Training
Squad UP Training
Secure Infrastructure Administrator
Contact
Home
SquadXpert
Cybersecurity
Cybersecurity
Cybersecurity
SquadXpert
CloudSec
Cybersecurity
DevSecOps
AI
Integration
MSSP
OT, IoT & Embedded Systems
October 21, 2019
SOC, CERT, CSIRT: discovering the players in operational security
Learn more
10/08/2019
Interview with TheExpertE – Baka D.
Learn more
October 1, 2019
Portrait of TheExpert – Grégory P., cybersecurity consultant
Learn more
October 1, 2019
Application security
Learn more
September 4, 2019
Vectra Cognito - Protection for the future
Learn more
August 26, 2019
Feedback – Squad at #DEFCON27 (1/3): What's that?
Learn more
June 24, 2019
Cyber weapon challenges and strategy – Part 2: Offensive cyber warfare
Learn more
June 20, 2019
Cyber weapon challenges and strategy - Part 1: cyber definitions
Learn more
June 3, 2019
[Cybersecurity News] macOS security flaw
Learn more
April 24, 2019
Pentesting in practice
Learn more
April 19, 2019
DevSecOps: Approach and general information
Learn more
April 5, 2019
[Reminder] Data protection - existing methods
Learn more
March 29, 2019
Set up a multi-threaded SSL vulnerability audit scanner using the QUALYS API on CentOS 7
Learn more
March 5, 2019
Cybersecurity: What are the different types of hackers?
Learn more
February 19, 2019
MixYourTalent – PASSI
Learn more
February 15, 2019
Expert profile – Nikola Božić
Learn more
February 1, 2019
Meet TheExpert - Gaël Musquet, resident hacker at Qwant
Learn more
April 25, 2018
Symmetric and asymmetric key encryption
Learn more
April 10, 2018
ATA: from overpass-the-hash to Pass-the-ticket
Learn more
March 13, 2018
Git explained in my own words
Learn more
December 18, 2017
How to exploit the CVE-2017-14706 vulnerability (Unauthenticated RCE) on a Denyall/Beeware box?
Learn more
June 25, 2017
Encryption - Definition and use
Learn more
June 25, 2017
PKI – A complex subject, but one with great potential
Learn more
1
2
3
4