[{"url":"https:\/\/blog.httpcs.com\/en\/blog-cybersecurity\/care-cybersecurity-acceleration-resilience-establishments-understanding-challenges-ensuring-compliance","titre":"CaRE (Cybersecurity Acceleration and Resilience for Establishments): Understanding the Challenges and Ensuring Compliance","date":"26\/03\/2025","image":null},{"url":"https:\/\/blog.httpcs.com\/en\/blog-cybersecurity\/the-importance-of-dast-dynamic-application-security-testing-in-your-web-security-strategy","titre":"The importance of DAST (Dynamic Application Security Testing) in your web security strategy","date":"13\/02\/2025","image":null},{"url":"https:\/\/blog.httpcs.com\/en\/blog-cybersecurity\/tourism-cybersecurity","titre":"Tourism \u0026 Cybersecurity","date":"26\/08\/2024","image":"https:\/\/blog.httpcs.com\/wp-content\/uploads\/tourisme-cybersecurite-2.jpg"}]