Security in 4 points
To best meet the diverse security needs of today, immunIT has opted to focus on 4 key thrusts for an effective approach of information systems security. We are convinced that technical security and governance should not be considered separately, and that infrastructure equipments are just a piece of the global security, as are end users. From our audit services and “post-mortem” digital investigation capabilities to the securing of your infrastructure and training of your users, immunIT can help you achieve a 360° vision of security.
- XIP – XIP – IP addresses mutation.
- Vulnerability disclosure – Cisco Meeting Server arbitrary TCP relaying.
- Drupwn – Yet another Drupal scanner.
- immunIT @ Nuit du Hack 2017.
- immunIT co-organisatrice de la Black Alps Conference 2017.
- SecurIT Breakfast – 14 mars – Palo Alto Networks TRAPS.
- The 2016 SANS Holiday Hack Challenge write-up.