Guides
In-depth resources to understand cybersecurity challenges and achieve compliance.
How to Analyze Email Headers: A Practical Guide for Security Teams
Complete guide to reading and interpreting email headers. Identify the real sender, verify SPF/DKIM/DMARC authentication, and spot anomalies in the network path.
Read guideHow to Configure SPF, DKIM, and DMARC: The Complete Guide to Protecting Your Email Domain
Step-by-step technical guide to configuring SPF, DKIM, and DMARC on your domain. Concrete examples for OVH, Google Workspace, and Microsoft 365. Verification and troubleshooting included.
Read guideHow to Spot a Fraudulent Email: 9 Warning Signs Your Employees Must Know
Practical guide to identifying phishing emails at work. 9 concrete warning signs with real-world examples, verification techniques, and a step-by-step procedure when in doubt.
Read guideWhat to Do After a Phishing Attack: Complete Incident Response Guide
Complete step-by-step procedure if an employee clicked on a phishing email. Technical containment, GDPR/CNIL legal obligations, ANSSI reporting, internal communication.
Read guideNIS2 Compliance for SMEs: Obligations, Penalties, and Complete Checklist
Complete NIS2 guide for small and mid-sized businesses. Who's affected, what the obligations are, what the penalties look like, and how to get compliant step by step.
Read guide