Photo by Charles Deluvio on Unsplash

Security Breaches Are Your Fault!

Confusion with the cloud shared responsibility model


Do you know what is happening with those who don't understand the cloud security shared...



Photo by Cristofer Jeschke on Unsplash

And Don't Forget ISO/IEC 30111

Guidelines for the vulnerability handling processes


This post is related to vulnerability handling processes (ISO/IEC 30111), complementing the...



Photo by Keagan Henman on Unsplash

Don't Be Ignorant of ISO/IEC 29147

Guidelines for the vulnerability disclosure processes


Would you like to get a clearer idea about vulnerability disclosure? Start with reading this...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (III)

Glimpsing the trends for 2021


In this final part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (II)

Current trends in prevention


In this second part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Jr Korpa on Unsplash

State of Cybersecurity 2020-21 (I)

Current trends of cybercriminals


In this first part of the state of cybersecurity 2020-21, we want to share with you some...



Photo by Karsten Winegeart on Unsplash

Secure Just by Being in a Cave?

Security of OSS — Fluid Attacks as a vivid example


We want to remind you that hiding your applications' source code can often provide you only an...



Photo by Joanna Kosinska on Unsplash

Cybersecurity as Strategy

Strategize with cybersecurity and avoid losses


A recently published article calls to elevate cybersecurity from operational to a strategic...



Photo by Charles Deluvio on Unsplash

"No, We Won't Get Hacked!"

And, "of course, I can always protect my company."


In cybersecurity, optimism bias and overconfidence can have pervasive consequences. I discuss...



Photo by Vinayak Varma on Unsplash

Anyone Can Look Inside!

Working with OSS today can be a great advantage


Security can be significantly enhanced when codes are presented publicly. In this post, we talk...



Photo by Charles Deluvio on Unsplash

Always 100% Ready for Remote Work

The product of a valuable effort over ten years ago


Here is an overview of what our technological architecture and our way of operation are, which...



Photo by Terry Vlisidis on Unsplash

Penetration Testing as a Service

NetSPI's 'advice': better platforms for PTaaS


This blog post is based on the webinar 'Scaling Your Security Program with Penetration Testing...




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.