Photo by eberhard grossgasteiger on Unsplash

I Saw Your Data on the Dark Web

What is the Dark Web and what do we find there?


I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we...



Photo by Karsten Winegeart on Unsplash

Secure Just by Being in a Cave?

Security of OSS — Fluid Attacks as a vivid example


We want to remind you that hiding your applications' source code can often provide you only an...



Photo by Joanna Kosinska on Unsplash

Cybersecurity as Strategy

Strategize with cybersecurity and avoid losses


A recently published article calls to elevate cybersecurity from operational to a strategic...



Photo by Charles Deluvio on Unsplash

"No, We Won't Get Hacked!"

And, "of course, I can always protect my company."


In cybersecurity, optimism bias and overconfidence can have pervasive consequences. I discuss...



Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Sebastian Pena Lambarri on Unsplash

Everyone Is Responsible for SEC

An overview of DevSecOps, better SecDevOps


Through this blog post, you will know what DevSecOps is, how it applies, and why it is...



Photo by Michael Fenton on Unsplash

Breaking Down DevOps

The central components of DevOps definition


Here we introduce DevOps, a working methodology whose principles are communication,...



Photo by Bradley Feller on Unsplash

We've Reached a New Standard

More requirements in Rules are firmly supported


Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...



Photo by NeONBRAND on unplash: https://unsplash.com/photos/dDvrIJbSCkg

Bankrupt by Wrong Cybersecurity!

How some firms (especially SMBs) can go broke


Do companies go bankrupt by a cybersecurity breach? Some people assure there is no evidence...



Broken blue ceramic plate on Unsplash: https://unsplash.com/photos/WdJkXFQ4VHY

Debug Like a Boss

Should CEOs discuss software defects?


Software quality management, including security weaknesses, has become of strategic relevance....



Digital heart beat monitor on Unsplash https://unsplash.com/photos/0lrJo37r6Nk

HealthTech Protection

How healthcare breakthroughs could help cybersecurity


In this blog post, we explore how simple yet incredibly effective healthcare practices could...



Choices. Photo by Nathan Dumlao on Unsplash: https://unsplash.com/photos/pMW4jzELQCw

Risk Indicator Roundup

A matter of taste


Here we compare risk indicators used in quantitative finance, giving their pros and cons. Most...




Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.