Compliance

Entries with this tag address cybersecurity standards and policies and cases where organizations fail or succeed in meeting them.

Photo by Jason Krieger on Unsplash

Felipe Ruiz


Keep tabs on this proposal from the Biden-Harris Admin

Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.

Photo by Nik Shuliahin on Unsplash

Jason Chavarría


For which security standards is pentesting a must-have?

We present whether penetration testing is required for compliance with these security standards: GDPR, GLBA, HIPAA, ISO 27001, PCI DSS, SOC 2 and SWIFT CSCF.

Photo by Hunters Race on Unsplash

Felipe Ruiz


Disclosure rules proposed by SEC may soon take effect

We briefly present the amendments to cybersecurity-related disclosure rules proposed by the SEC, their potential benefits and costs, and some recommendations.

Photo by Sander Sammy on Unsplash

Jason Chavarría


Advice for firms to comply with the HIPAA Security Rule

NIST published the second revision draft to its SP 800-66. Learn about the most significant changes that are being introduced.

Photo by Billy Huynh on Unsplash

Felipe Ruiz


NIST chose four algorithms, and four others are pending

NIST chose the first four quantum-resistant cryptography algorithms. Here you'll learn about it with an intro to public key cryptography and quantum computing.

Photo by Mathew Schwartz on Unsplash

Jason Chavarría


Enhancing cybersecurity across government entities

Learn about the Federal Rotational Cyber Workforce Program Act of 2021 and the State and Local Government Cybersecurity Act of 2021, which were signed into law.

Photo by Geran de Klerk on Unsplash

Rafael Alvarez


Five policies to test your organization's security

We want to guide you about some management policies that we suggest you could use to answer with high precision how secure your information is.

Photo by Jonathan Cosens Photography on Unsplash

Jason Chavarría


Key practices for managing cyber supply chain risk

In this blog post, we summarize some of the NIST's suggested key practices to manage cybersecurity supply chain risk.

Photo by Umberto on Unsplash

Jason Chavarría


Google is forced to give EU users a 'Reject all' option

Users in France can now reject all cookies in Google Search and YouTube more easily after these services' banners were found to break EU data privacy laws.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.