Filter by author:
Filter by tag:
Release date:
Filter by title:
![Photo by Jr Korpa on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1736984492/blog/building-python-testing-framework/cover_building_python_testing_framework.webp)
Juan Díaz
How we enhance our tests by standardizing them
At Fluid Attacks, we built an internal testing framework to improve our tests in Python. Let's talk about our motivation and results.
![Photo by Logan Weaver on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1733510698/blog/introduction-cybersecurity-aviation-sector/cover_introduction_cybersecurity_aviation_sector.webp)
Felipe Ruiz
Introduction to cybersecurity in the aviation sector
As part of the transportation industry, the aviation sector, in its massive digital transformation, has faced cybersecurity challenges worth highlighting.
![Photo by Maxim Hopman on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1668626573/blog/cvssf-risk-exposure-metric/cover_cvssf.webp)
Jason Chavarría
Why measure cybersecurity risk with our CVSSF metric?
We present some of the flaws of the traditional measure of cybersecurity risk and introduce CVSSF, the risk-exposure-based metric with which we overcome them.
![Photo by Jukan Tateisi on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1732826887/blog/fluid-attacks-new-testing-architecture/cover_fluid_attacks_new_testing_architecture.webp)
Daniel Salazar
Our new testing architecture for software development
Learn about how we test our platform, the pain points we faced in the past, and a new architecture that improves our testing quality and development experience.
![Photo by Clay Banks on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1730243221/blog/point-of-sale-security/cover_point_of_sale_security.webp)
Felipe Ruiz
Protecting your PoS systems from cyber threats
PoS devices are now part and parcel of the retail industry. In this post, we explain the risks these systems face and the best practices for protecting them.
![Photo by Charles Etoroma on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1729549213/blog/retail-sector-data-breaches/cover_retail_sector_data_breaches.webp)
Felipe Ruiz
Top seven successful cyberattacks against this industry
Cyberattacks that negatively impact some companies can serve as a warning and a lesson for others, at least for those still behind the curve in cybersecurity.
![Photo by Anima Visual on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1728064166/blog/retail-sector-cybersecurity/cover_retail_sector_cybersecurity.webp)
Felipe Ruiz
Challenges, threats, and best practices for retailers
The retail sector is part of the global digital transformation, so it is constantly exposed to security threats, for which it should have a preventive posture.
![Photo by photo nic on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1727477788/blog/security-through-transparency/cover_security_through_transparency.webp)
Juan Díaz
Be more secure by increasing trust in your software
Being secure and being transparent are commonly seen as opposites, but they aren't. Learn how openness can become a business differentiator.
![Photo by Dmitry Ant on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1724451239/blog/cloud-security-assessment/cover-cloud-security-assessment.webp)
Wendy Rodriguez
How it works and how it improves your security posture
This proactive approach helps ensure applications, sensitive data and cloud infrastructure remain secure, compliant and resilient.