Opinions

Read our or other experts' take on cybersecurity topics, such as trends, technology, certifications and ethical hacking.

Photo by photo nic on Unsplash

Juan Díaz


Be more secure by increasing trust in your software

Being secure and being transparent are commonly seen as opposites, but they aren't. Learn how openness can become a business differentiator.

Photo by Dmitry Ant on Unsplash

Wendy Rodriguez


How it works and how it improves your security posture

This proactive approach helps ensure applications, sensitive data and cloud infrastructure remain secure, compliant and resilient.

Photo by James Lee on Unsplash

Jason Chavarría


A lesson of this global IT crash is to shift left

A defect in a CrowdStrike sensor update made 8.5M devices crash. We think this event shows the importance of testing security from early stages of development.

Photo by Brian Kelly on Unsplash

Felipe Ruiz


We need you, but we can't give you any money

We want to persist in raising awareness about the scarce support that many open-source software projects, on which nearly everyone depends, are receiving.

Photo by Roy Muz on Unsplash

Felipe Ruiz


Lessons learned from black swans

There are also "black swans" in cybersecurity. We can run into one of them at any time, so we must be prepared.

Photo by Valery Fedotov on Unsplash

Felipe Ruiz


A digital infrastructure issue that many still ignore

The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.

Photo by A S on Unsplash

Felipe Ruiz


How can we justify the investment in cybersecurity?

While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.

Photo by James Orr on Unsplash

Jason Chavarría


Our pick of the hardest challenges for ethical hackers

We share what to us are the 10 most challenging ethical hacking certifications, so that you can choose your next one and even trace a path to help your career.

Photo by Eduardo Balderas on Unsplash

Jason Chavarría


Understanding 51 new PCI DSS requirements made easy

PCI DSS v4.0 brings 51 new requirements that are best practices until March 2025. We share a classification that may help take it all in.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.