![Photo by James Lee on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1722027176/blog/crowdstrike-incident-july-2024/cover_crowdstrike_july_2024.webp)
Jason Chavarría
A lesson of this global IT crash is to shift left
A defect in CrowdStrike's sensor made 8.5M devices crash. We argue that this event shows the importance of testing security from early stages of development.
![Photo by Brian Kelly on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1713388624/blog/undersupported-digital-infrastructure/cover_undersupported_digital_infrastructure.webp)
Felipe Ruiz
We need you, but we can't give you any money
We want to persist in raising awareness about the scarce support that many open-source software projects, on which nearly everyone depends, are receiving.
![Photo by Roy Muz on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1712696620/blog/lessons-cybersecurity-black-swans/cover_lessons_cybersecurity_black_swans.webp)
Felipe Ruiz
Lessons learned from black swans
There are also "black swans" in cybersecurity. We can run into one of them at any time, so we must be prepared.
![Photo by Valery Fedotov on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1711073708/blog/nebraska-joke-infrastructure-dependency/cover_nebraska_joke_infrastructure_dependency.webp)
Felipe Ruiz
A digital infrastructure issue that many still ignore
The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.
![Photo by A S on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1709774678/blog/justify-investment-in-cybersecurity/cover_justify_investment_in_cybersecurity.webp)
Felipe Ruiz
How can we justify the investment in cybersecurity?
While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.
![Photo by James Orr on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1707230827/blog/top-10-hacking-certifications/cover_certifications.webp)
Jason Chavarría
Our pick of the hardest challenges for ethical hackers
We share what to us are the 10 most challenging ethical hacking certifications, so that you can choose your next one and even trace a path to help your career.
![Photo by Eduardo Balderas on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1706281168/blog/pci-dss-best-practices-2024/cover_pci_dss_best_practices.webp)
Jason Chavarría
Understanding 51 new PCI DSS requirements made easy
PCI DSS v4.0 brings 51 new requirements that are best practices until March 2025. We share a classification that may help take it all in.
![Photo by Ray Hennessy on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1706319423/blog/the-mother-of-all-breaches/cover_the_mother_of_all_breaches.webp)
Felipe Ruiz
Let's rather say a bunch of breaches in a single box
They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.
![Photo by Wynand Uys on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1704478373/blog/6-main-items-gen-ai-usage-policy/cover_gen_ai_policy.webp)
Jason Chavarría
Six main items in an AI policy for software development
Your company should have a policy about generative AI usage for software development. Read our suggestions on the most important items to include.