Skip to content

La Redoute.io

The La Redoute tech blog

La Redoute.io

The La Redoute tech blog

  • Home
Security

Log4j what is it? And why is so important?

Hugo Baptista 0 Comments

Log4j is one of the most widely used tools to collect information across computers systems, apps, networks, websites, etc. It has been downloaded millions of times. Also, it is used…

Security

What is Security Information and Event Management? (SIEM)

João Oliveira 0 Comments

What is a SIEM? The term SIEM (Security Information and Event Management) defined by Nicolett and Willliams in 2005 comes from combining two concepts: Security Information Management (SIM) – is…

Security

PenTest: Vulnerability Analysis and Exploitation

Vincent Fack 0 Comments

Identify interesting information There are many types of vulnerabilities ranging from simple disclosure of information to remote code execution, and it could be either harmful or critical for the information…

Security

How to Tackle System Hardening using Security Benchmarks

Jessica Ferreira 0 Comments

What is Hardening? According to the National Institute of Standards and Technology (NIST), Hardening is defined as “a process intended to eliminate a means of attack by patching vulnerabilities and…

Security

PenTest: Information Gathering and Scanning

Vincent Fack 0 Comments

The importance of gathering information To start a pentest it’s important to collect information about the target in the first place, this also includes to define the goals and the…

Security

PenTest: Introduction

acraske 1 Comments

What is a penetration test? A penetration test or “pen test” is a simulated attack on an information system authorized by the requester to evaluate the security of one’s target.…

La Redoute.io

The La Redoute tech blog

Copyright laredoute.io © All rights reserved | Blogus by Themeansar.

  • Personal Data
  • Legal notices
  • Contact
  • People