Compliance

Entries with this tag address cybersecurity standards and policies and cases where organizations fail or succeed in meeting them.

Photo by Jean-Daniel Calame on Unsplash

Jason Chavarría


Now we follow all best practices required by OpenSSF

After evidencing statement and branch coverages above 90% and other high-level best practices, our open-source project Universe got the rare OpenSSF gold badge.

Photo by Sara Kurfeß on Unsplash

Felipe Ruiz


A brief overview of this recent EU draft regulation

Learn about the draft Cyber Resilience Act, including its purposes, obligations and penalties, before its final version comes.

Photo by Ugur Arpaci on Unsplash

Felipe Ruiz


Soon it will be a must in cybersecurity due to NIS2

We briefly introduce the NIS 2 Directive and pay special attention to its cybersecurity training requirement for organizations' boards of directors.

Photo by Jason Krieger on Unsplash

Felipe Ruiz


Keep tabs on this proposal from the Biden-Harris Admin

Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.

Photo by Nik Shuliahin on Unsplash

Jason Chavarría


For which security standards is pentesting a must-have?

We present whether penetration testing is required for compliance with these security standards: GDPR, GLBA, HIPAA, ISO 27001, PCI DSS, SOC 2 and SWIFT CSCF.

Photo by Hunters Race on Unsplash

Felipe Ruiz


Disclosure rules proposed by SEC may soon take effect

We briefly present the amendments to cybersecurity-related disclosure rules proposed by the SEC, their potential benefits and costs, and some recommendations.

Photo by Sander Sammy on Unsplash

Jason Chavarría


Advice for firms to comply with the HIPAA Security Rule

NIST published the second revision draft to its SP 800-66. Learn about the most significant changes that are being introduced.

Photo by Billy Huynh on Unsplash

Felipe Ruiz


NIST chose four algorithms, and four others are pending

NIST chose the first four quantum-resistant cryptography algorithms. Here you'll learn about it with an intro to public key cryptography and quantum computing.

Photo by Mathew Schwartz on Unsplash

Jason Chavarría


Enhancing cybersecurity across government entities

Learn about the Federal Rotational Cyber Workforce Program Act of 2021 and the State and Local Government Cybersecurity Act of 2021, which were signed into law.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.