Company

Posts with this tag address organizational security breach events and news that may be valuable for business cybersecurity.

Photo by Logan Weaver on Unsplash

Felipe Ruiz


Introduction to cybersecurity in the aviation sector

As part of the transportation industry, the aviation sector, in its massive digital transformation, has faced cybersecurity challenges worth highlighting.

Photo by Maxim Hopman on Unsplash

Jason Chavarría


Why measure cybersecurity risk with our CVSSF metric?

We present some of the flaws of the traditional measure of cybersecurity risk and introduce CVSSF, the risk-exposure-based metric with which we overcome them.

Photo by Jukan Tateisi on Unsplash

Daniel Salazar


Our new testing architecture for software development

Learn about how we test our platform, the pain points we faced in the past, and a new architecture that improves our testing quality and development experience.

Photo by Clay Banks on Unsplash

Felipe Ruiz


Protecting your PoS systems from cyber threats

PoS devices are now part and parcel of the retail industry. In this post, we explain the risks these systems face and the best practices for protecting them.

Photo by Charles Etoroma on Unsplash

Felipe Ruiz


Top seven successful cyberattacks against this industry

Cyberattacks that negatively impact some companies can serve as a warning and a lesson for others, at least for those still behind the curve in cybersecurity.

Photo by Anima Visual on Unsplash

Felipe Ruiz


Challenges, threats, and best practices for retailers

The retail sector is part of the global digital transformation, so it is constantly exposed to security threats, for which it should have a preventive posture.

Photo by photo nic on Unsplash

Juan Díaz


Be more secure by increasing trust in your software

Being secure and being transparent are commonly seen as opposites, but they aren't. Learn how openness can become a business differentiator.

Photo by Dmitry Ant on Unsplash

Wendy Rodriguez


How it works and how it improves your security posture

This proactive approach helps ensure applications, sensitive data and cloud infrastructure remain secure, compliant and resilient.

Photo by The Average Tech Guy on Unsplash

Wendy Rodriguez


Sophisticated web-based attacks and proactive measures

Discover top web application security threats and how attackers exploit them. Also, read about effective strategies developers can use to protect their apps.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.