Entries with this tag address the benefits of cloud computing and the security risks or issues in these vast networks of remote servers.

Photo by James Beheshti on Unsplash

Jason Chavarría

The basics of cloud security posture management

Cloud security posture management involves vulnerability assessment, prioritization and remediation to secure cloud-based systems and infrastructures.

Photo by Kostiantyn Li on Unsplash

Jason Chavarría

Our CLI is an approved AST tool to secure cloud apps

Fluid Attacks' automated tool is recommended by the App Defense Alliance for static scanning under the Cloud Application Security Assessment (CASA) framework.

Photo by Alvan Nee on Unsplash

Jason Chavarría

Continuous manual security tests for going beyond MCSB

The Microsoft cloud security benchmark recommends regular red teaming and pentesting. We talk about how we help you go beyond that and achieve Azure DevSecOps.

Photo by jean wimmerlin on Unsplash

Jason Chavarría

Trends in cyberattacks and prevention this year

In this post, Fluid Attacks shares a digest of trends in cyberattacks and prevention in 2022.

Photo by Pejvak Samadani on Unsplash

Jason Chavarría

Continuous manual security tests for AWS CAF compliance

AWS has sketched the way to achieve DevSecOps and provided its Cloud Adoption Framework. In it, it advises pen testing and red teaming, two things we excel at.

Photo by Aleksandar Cvetanovic on Unsplash

Jason Chavarría

Benefits of shifting cloud security left

This post defines cloud DevSecOps, presents the key issues it helps tackle and gives you a condensed list of its benefits.

Photo by Vincent van Zalinge on Unsplash

Jason Chavarría

What was Azure's four-year-old vulnerability?

A recently discovered four-year-old vulnerability in Microsoft's Azure App Service has been keeping the source codes of customer applications public.

Photo by Jametlene Reskp on Unsplash

Jason Chavarría

Insider attack suspect was arrested this month

An individual was arrested for extorting Ubiquiti, the company where he worked as a developer. In this post, we narrate the key points of his attack.

Photo by Elisabeth Pieringer on Unsplash

Felipe Zárate

Tips for understanding the Apple–China controversy

In this post, we will understand why the Apple data center inaugurated in Guizhou reopened the controversy over data privacy in China.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.