Philosophy

Entries where we describe security best practices and approaches, tackling basic, as well as trending, cybersecurity concepts.

Photo by Google DeepMind on Unsplash

Felipe Ruiz


Towards an approach that engages more than SCA and SBOM

Understand what a comprehensive software supply chain security approach should aim at and why it is crucial to implement it during your company's SDLCs.

Photo by David Ramírez on Unsplash

Jason Chavarría


Or what makes the ethical hacker

If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.

Photo by charlesdeluvio on Unsplash

Felipe Ruiz


Recognize the value of this security assessment method

We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.

Photo by James Beheshti on Unsplash

Jason Chavarría


The basics of cloud security posture management

Cloud security posture management involves vulnerability assessment, prioritization and remediation to secure cloud-based systems and infrastructures.

Photo by Luis Villasmil on Unsplash

Felipe Ruiz


Tips for choosing a vulnerability management solution

If you are still wondering what you should pay more attention to when choosing a vulnerability management solution, we recommend you read this blog post.

Photo by JC Gellidon on Unsplash

Jason Chavarría


Definition, implementation, importance and alternatives

Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.

Photo by Tamas Kolossa on Unsplash

Jason Chavarría


Vulnerability scanning and pentesting for a safer web

Learn how website and web app security scanning work, their role in vulnerability management, and why mix them with pentesting in vulnerability assessment.

Photo by Alexander Ant on Unsplash

Felipe Ruiz


Definitions, classifications and pros and cons

Learn what vulnerability scanners and vulnerability scanning are, what their classifications are, and what their pros and cons are.

Photo by John Schnobrich on Unsplash

Jason Chavarría


Is your security testing covering the right risks?

You need to prioritize the security testing techniques that cover the actual threats you're facing. We explain how Lumu's MITRE ATT&CK® Global Matrix can help.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.