Newsletter November 2022

Newsletter November 2022

Hi?there,

By sharing our knowledge, leveraging business strategy, co-creating digital products, customer experiences and technologies we deliver end-to-end solutions.”

From ideation to production, we work with people around the globe to advise, build, run and support the creation of products with purpose.

Discover more about what we do, who we serve and what we can do for you.

In Today's page:

#1?Vietnam – A new leading destination for Software Development in APAC
#2?Penetration testing certification: Some tips to ace it
#3?What are the different types of phishing attacks and how to counter them?
#4?Implementation of unique governance of Jira and Confluence for RIMOWA
#5?Ticket sale infrastructure penetration test and configuration audit for a public transportation company

????? Upcoming Event
???? Webinar in French
No alt text provided for this image

#1 Vietnam – A new leading destination for Software Development in APAC

Titled?“A small but mighty powerhouse” by Forbes, Vietnam has gone from strength to strength as an international partner?in providing remote software development. With its great strides in education, economic and political stability, and overall tech literacy, Vietnam is setting a new standard for effective and efficient remote software development in the APAC region.??So, what makes Vietnam such an excellent destination for remote software development?

No alt text provided for this image


#2 Penetration testing certification: Some tips to ace it

Why should I get a penetration testing certification? Unlike many other career paths, penetration testing doesn’t require any specific degree. Your level of experience and eagerness to continuously develop your hands-on skills will prevail in the eyes of a recruiter/client. However, it is easier to transition into a penetration testing role after a couple of years of experience in IT and information security, which is my case.

No alt text provided for this image


#3?What are the different types of phishing attacks and how to counter them?

What is a phishing attack? Social engineering attacks, such as phishing, are the most common types of cyber-attacks along with ransomware, malware, data breach and Distributed Denial of Service (DDoS). So common that 91% of cyberattacks start with a phishing email, according to Trend Micro. But what is phishing exactly?

No alt text provided for this image


#4?Implementation of unique governance of Jira and Confluence for RIMOWA

Within RIMOWA (premium luggage brand), 12 teams use Jira and Confluence differently: workflows, fields, ticket types, etc. In order to solve these problems of homogeneity and alignment, we conducted an audit of the existing system and proposed a new organization.


No alt text provided for this image

#5?Ticket sale infrastructure penetration test and configuration audit for a public transportation company

Our client is a public transport operator that manages most of the public transportation system in its region... The client wanted to assess the security of its ticketing infrastructure. This infrastructure included all the machines and services related to the sale of transportation tickets.??


??NEXT EVENT? ???? Webinar in French

No alt text provided for this image

Thanks for spending part of your day with us.

If you want to receive our Newsletter right to your mailbox,?click here?to subscribe.

Have a good day !

Positive Thinking Company

要查看或添加评论,请登录

社区洞察

其他会员也浏览了