Posts with this tag address the possibility of exposure, damage or loss of assets in organizations due to security weaknesses and cyber threats.

Photo by Sara Kurfeß on Unsplash

Felipe Ruiz

A brief overview of this recent EU draft regulation

Learn about the draft Cyber Resilience Act, including its purposes, obligations and penalties, before its final version comes.

Photo by Saad Chaudhry on Unsplash

Jason Chavarría

Increase the board's cyber savvy with these reads

Boards need to gain skills to identify, assess and supervise their organizations' cyber risk-management measures. We share resources to help them on their way.

Photo by Ugur Arpaci on Unsplash

Felipe Ruiz

Soon it will be a must in cybersecurity due to NIS2

We briefly introduce the NIS 2 Directive and pay special attention to its cybersecurity training requirement for organizations' boards of directors.

Photo by JC Gellidon on Unsplash

Jason Chavarría

Definition, implementation, importance and alternatives

Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.

Photo by Jason Krieger on Unsplash

Felipe Ruiz

Keep tabs on this proposal from the Biden-Harris Admin

Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.

Photo by Hunters Race on Unsplash

Felipe Ruiz

Disclosure rules proposed by SEC may soon take effect

We briefly present the amendments to cybersecurity-related disclosure rules proposed by the SEC, their potential benefits and costs, and some recommendations.

Photo by Maxim Hopman on Unsplash

Jason Chavarría

Why measure cybersecurity risk with our CVSSF metric?

We present some of the flaws of the traditional measure of cybersecurity risk and introduce CVSSF, the risk-exposure-based metric with which we overcome them.

Photo by Agê Barros on Unsplash

Felipe Ruiz

Take care of your apps from cybercriminals on the prowl

Here we talk about mobile apps and some of their possible security risks, as well as what MAST is and how it can contribute to app security.

Photo by Sander Sammy on Unsplash

Jason Chavarría

Advice for firms to comply with the HIPAA Security Rule

NIST published the second revision draft to its SP 800-66. Learn about the most significant changes that are being introduced.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.