Author:
Felipe Ruiz
Category:
philosophy
Tags:
cloud,
information,
cybersecurity,
security,
mistake,
company
Do you know what is happening with those who don't understand the cloud security shared...
Author:
Felipe Ruiz
Category:
politics
Tags:
cybersecurity,
standard,
vulnerability,
information,
company,
challenge
This post is related to vulnerability handling processes (ISO/IEC 30111), complementing the...
Author:
Felipe Ruiz
Category:
politics
Tags:
cybersecurity,
standard,
vulnerability,
information,
company,
challenge
Would you like to get a clearer idea about vulnerability disclosure? Start with reading this...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
vulnerability,
information,
web,
risk,
standard
Here I give you an overview of the recent Colombian Foreign Ministry's security problem and the...
Author:
Felipe Ruiz
Category:
philosophy
Tags:
web,
information,
credential,
password,
security,
cybersecurity
I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we...
Author:
Felipe Ruiz
Category:
politics
Tags:
policies,
cybersecurity,
social,
information,
mistake,
business
This blog post might give you a better understanding of what has been achieved by Max Schrems...
Here you'll learn about Security champions. But first, we give you five recommendations if...
Through this blog post, you will know what DevSecOps is, how it applies, and why it is...
Here we introduce DevOps, a working methodology whose principles are communication,...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
vulnerability,
standard,
information,
software,
application
This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...
Author:
Felipe Ruiz
Category:
philosophy
Tags:
security,
cybersecurity,
information,
documentation,
standard,
ethical-hacking
Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...
Author:
Rafael Alvarez
Category:
opinions
Tags:
security,
company,
business,
protect,
information,
healthcare
Here is an overview of what our technological architecture and our way of operation are, which...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.