INTRINSEC INTRINSEC INTRINSEC INTRINSEC
  • Services & Products

      Services 

      IT Security Tips

      • Maturity Diagnosis
      • CISO as a Service
      • Risk Analysis
      • Business Resilience
      • Information Systems Security Governance
      • Audit & Compliance
      • Awareness

      Offensive Security & Auditing

      • Pentest
      • Red Team
      • Purple Team
      • TIBER-EU / DORA TLPT
      • Technical Audit

      Security architecture and integration 

      • Security architecture and integration

      Cyber Threat Intelligence

      • CTI - Cyber Threat Intelligence
      • TIS - Threat Intelligence Services
      • DRPS - Digital Risk Protection Services
      • EASM – External Attack Surface Management
      • Data leak detection
      • Brand protection

      Security Operations Center

      • MDR For Cloud
      • MDR For Endpoint
      • SOC - Security Operations Center
      • VOC - Vulnerability Operations Center

      Incident Response & Crisis Management

      • CERT Subscription
      • Cyber Crisis Management
      • Incident Response
      • Threat Hunting
      • Incident Response Academy

      Products 

      • Cyboard
      • Phish Tracker
      • Vuln Tracker
      • Extended Threat Intelligence Platform
      • CTI Feeds
  • Expertise

      Professions

      • Strategy & Governance
      • Risk identification & compliance
      • Security Architecture & Expertise
      • Cyber Defense Operations
      • Resilience & Business Continuity
      • Incident & Crisis Management
      • Cybersecurity Awareness & Culture

      challenges

      • Regulatory Compliance & Alignment
      • Business Resilience & Cyber Crisis Management
      • Trusted Clients & Cybersecurity Credibility
      • Efficiency & Performance Safety

      challenges

      • Cloud Security
      • Zero Trust & Access Security
      • NIS2 Directive
      • DORA Compliance
      • Data management
      • IoT Security
      • Patch Management
      • Cybersecurity Awareness

      Risks

      • System Availability & Integrity
      • Compliance & Governance
      • Data & Identities
      • Financials & Digital Fraud
      • Infrastructure & Suppliers
      • Advanced & Emerging Threats
  • Sector & Maturity

      Business sectors 

      Industrial
      Health
      Banking & Finance
      Audience
      Tech
      Retail

      Maturity levels

      Startups & Scaleups
      SMEs & Mid-Sized Companies
      Public entity
      Groups & Multinationals
      OIV & Ministries
  • The company

      Who are we ?

      Discover our history and expertise in cybersecurity.

      Our commitments

      We defend the integrity and security of your information systems.

      Recruitment

      Looking to take on exciting challenges? Join our teams.

      Partners

      Strategic alliances with leading players for optimal protection.

  • News

      Events

      Join us for our upcoming cybersecurity events, conferences and webinars.

      Blog

      Discover our analyses on cyber news, trends and our expert advice.

Contact
Contact

Expert perspectives

Cyber Threat Intelligence

Panorama Cyber Threat Intelligence 2018

AdminJanuary 25, 2019
CERT

CoRIIN 2019

Omar JbariJanuary 23, 2019
Cyber Threat Intelligence

Les menaces cyber : une montée en puissance dans la zone Moyen-Orient et Afrique du Nord

AdminDecember 6, 2018
Security Watch

[Azure] Pratique de développement non sécurisée : exposition d’identifiants d’accès

Adrien BouteillerNovember 13, 2018
Security Watch

[Azure] Unsecure development practice: FTP credentials leakage

Adrien BouteillerNovember 13, 2018
Uncategorized

CVE-2018-15481 UCOPIA Wireless Appliance restricted shell escape (< 5.1.13)

AdminNovember 13, 2018
Cyber Threat Intelligence

Interview de Clotilde, Responsable Analyse Threat Intelligence

AdminNovember 13, 2018
SSI Council

4 bonnes pratiques de sensibilisation SSI

IntrinsicApril 17, 2018
Safety Assessment

Red Teaming : Nos retours d’expérience

IntrinsicMarch 20, 2018
Safety Assessment

Red Teaming : Simulez l’impact d’une cyberattaque

IntrinsicMarch 20, 2018
Cyber Threat Intelligence

Le Groupe Rocher, client historique de la Cyber Threat Intelligence

IntrinsicFebruary 14, 2018
Cyber Threat Intelligence

Qu’est-ce que la Cyber Threat Intelligence ?

IntrinsicFebruary 14, 2018
  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 23
Logo_Isec_Slogan_white

Our job? To protect yours.

  • Who are we ?
  • Recruitment
  • Cookie Policy
  • Personal Data Protection Charter
  • Legal notice
  • Offensive Security & Auditing
  • SSI Council
  • Security Architecture & Integration
  • SOC - Security Operation Center
  • CTI – Cyber Threat Intelligence
  • CERT - Incident Response
  • © Intrinsec 2025 | All rights reserved
INTRINSEC
  • Services & Products

      Services 

      IT Security Tips

      • Maturity Diagnosis
      • CISO as a Service
      • Risk Analysis
      • Business Resilience
      • Information Systems Security Governance
      • Audit & Compliance
      • Awareness

      Offensive Security & Auditing

      • Pentest
      • Red Team
      • Purple Team
      • TIBER-EU / DORA TLPT
      • Technical Audit

      Security architecture and integration 

      • Security architecture and integration

      Cyber Threat Intelligence

      • CTI - Cyber Threat Intelligence
      • TIS - Threat Intelligence Services
      • DRPS - Digital Risk Protection Services
      • EASM – External Attack Surface Management
      • Data leak detection
      • Brand protection

      Security Operations Center

      • MDR For Cloud
      • MDR For Endpoint
      • SOC - Security Operations Center
      • VOC - Vulnerability Operations Center

      Incident Response & Crisis Management

      • CERT Subscription
      • Cyber Crisis Management
      • Incident Response
      • Threat Hunting
      • Incident Response Academy

      Products 

      • Cyboard
      • Phish Tracker
      • Vuln Tracker
      • Extended Threat Intelligence Platform
      • CTI Feeds
  • Expertise

      Professions

      • Strategy & Governance
      • Risk identification & compliance
      • Security Architecture & Expertise
      • Cyber Defense Operations
      • Resilience & Business Continuity
      • Incident & Crisis Management
      • Cybersecurity Awareness & Culture

      challenges

      • Regulatory Compliance & Alignment
      • Business Resilience & Cyber Crisis Management
      • Trusted Clients & Cybersecurity Credibility
      • Efficiency & Performance Safety

      challenges

      • Cloud Security
      • Zero Trust & Access Security
      • NIS2 Directive
      • DORA Compliance
      • Data management
      • IoT Security
      • Patch Management
      • Cybersecurity Awareness

      Risks

      • System Availability & Integrity
      • Compliance & Governance
      • Data & Identities
      • Financials & Digital Fraud
      • Infrastructure & Suppliers
      • Advanced & Emerging Threats
  • Sector & Maturity

      Business sectors 

      Industrial
      Health
      Banking & Finance
      Audience
      Tech
      Retail

      Maturity levels

      Startups & Scaleups
      SMEs & Mid-Sized Companies
      Public entity
      Groups & Multinationals
      OIV & Ministries
  • The company

      Who are we ?

      Discover our history and expertise in cybersecurity.

      Our commitments

      We defend the integrity and security of your information systems.

      Recruitment

      Looking to take on exciting challenges? Join our teams.

      Partners

      Strategic alliances with leading players for optimal protection.

  • News

      Events

      Join us for our upcoming cybersecurity events, conferences and webinars.

      Blog

      Discover our analyses on cyber news, trends and our expert advice.

Contact
INTRINSEC
About cookies

With your consent, Intrinsec uses cookies or similar technologies and processes personal data based on legitimate interests, to optimize the advertising campaigns we conduct on third-party sites (such as LinkedIn), but also to track our audiences (Umami).

By clicking on "I choose" you will access the detailed list of these cookies.

 

You can modify and customize the settings for the purposes of processing cookies and trackers for which you have given your consent. You can also object to all of these processing activities. Your choice will be saved for a period of 6 months.

Analytical storage Always active
Allow Google Analytics to measure how I use the site to improve functionality and service.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Advertising storage
The technical storage or access that is used exclusively for statistical purposes. Allow Google to save advertising information on my device for better ad relevance.
User advertising data
Sharing my activity data with Google for targeted advertising.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Choose my preferences
  • {title}
  • {title}
  • {title}
English
French