Photo by Charles Deluvio on Unsplash

Security Breaches Are Your Fault!

Confusion with the cloud shared responsibility model


Do you know what is happening with those who don't understand the cloud security shared...



Photo by Cristofer Jeschke on Unsplash

And Don't Forget ISO/IEC 30111

Guidelines for the vulnerability handling processes


This post is related to vulnerability handling processes (ISO/IEC 30111), complementing the...



Photo by Keagan Henman on Unsplash

Don't Be Ignorant of ISO/IEC 29147

Guidelines for the vulnerability disclosure processes


Would you like to get a clearer idea about vulnerability disclosure? Start with reading this...



Photo by Jono Hirst on Unsplash

Thoughtless Vulnerability Reporting

The Colombian Foreign Ministry faced a big trouble


Here I give you an overview of the recent Colombian Foreign Ministry's security problem and the...



Photo by eberhard grossgasteiger on Unsplash

I Saw Your Data on the Dark Web

What is the Dark Web and what do we find there?


I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we...



Photo by James Pond on Unsplash

Schrems Trampled on the Shield

The EU-US Privacy Shield agreement is now invalid


This blog post might give you a better understanding of what has been achieved by Max Schrems...



Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Sebastian Pena Lambarri on Unsplash

Everyone Is Responsible for SEC

An overview of DevSecOps, better SecDevOps


Through this blog post, you will know what DevSecOps is, how it applies, and why it is...



Photo by Michael Fenton on Unsplash

Breaking Down DevOps

The central components of DevOps definition


Here we introduce DevOps, a working methodology whose principles are communication,...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Bradley Feller on Unsplash

We've Reached a New Standard

More requirements in Rules are firmly supported


Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...



Photo by Charles Deluvio on Unsplash

Always 100% Ready for Remote Work

The product of a valuable effort over ten years ago


Here is an overview of what our technological architecture and our way of operation are, which...




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.