Cybersecurity

Posts with this tag cover practices and technologies used to protect the computer systems and sensitive data of organizations and their users from cyberattacks.

Photo by JC Gellidon on Unsplash

Jason Chavarría


Definition, implementation, importance and alternatives

Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.

Photo by Jason Krieger on Unsplash

Felipe Ruiz


Keep tabs on this proposal from the Biden-Harris Admin

Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.

Photo by Tamas Kolossa on Unsplash

Jason Chavarría


Vulnerability scanning and pentesting for a safer web

Learn how website and web app security scanning work, their role in vulnerability management, and why mix them with pentesting in vulnerability assessment.

Photo by Alexander Ant on Unsplash

Felipe Ruiz


Definitions, classifications and pros and cons

Learn what vulnerability scanners and vulnerability scanning are, what their classifications are, and what their pros and cons are.

Photo by John Schnobrich on Unsplash

Jason Chavarría


Is your security testing covering the right risks?

You need to prioritize the security testing techniques that cover the actual threats you're facing. We explain how Lumu's MITRE ATT&CK® Global Matrix can help.

Photo by Marino Linic on Unsplash

Felipe Ruiz


How this process works and what benefits come with it

Learn about the vulnerability management process, its stages, and the benefits your organization can obtain by implementing it.

Photo by Saketh Upadhya on Unsplash

Felipe Ruiz


Get an overview of vulnerability assessment

Learn what vulnerability assessment is, why this IT systems evaluation process is important, what types exist, and how it relates to vulnerability management.

Photo by Anchor Lee on Unsplash

Jason Chavarría


Benefits of continuous over point-in-time pentesting

Continuous penetration testing beats periodic point-in-time pen tests. We present its benefits and how we overcome challenges to its implementation.

Photo by Nik Shuliahin on Unsplash

Jason Chavarría


For which security standards is pentesting a must-have?

We present whether penetration testing is required for compliance with these security standards: GDPR, GLBA, HIPAA, ISO 27001, PCI DSS, SOC 2 and SWIFT CSCF.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.