Author:
Julian Arango
Category:
philosophy
Tags:
cybersecurity,
mistake,
risk,
business,
company,
hacking
A recently published article calls to elevate cybersecurity from operational to a strategic...
Author:
Julian Arango
Category:
philosophy
Tags:
cybersecurity,
mistake,
risk,
business,
company,
hacking
In cybersecurity, optimism bias and overconfidence can have pervasive consequences. I discuss...
Author:
Felipe Ruiz
Category:
politics
Tags:
security,
cybersecurity,
software,
web,
vulnerability,
risk
In this post, we show you the exposed vulnerabilities of one of the many online voting options...
Author:
Julian Arango
Category:
interview
Tags:
machine learning,
cybersecurity,
security,
interview,
risk,
software
We had the pleasure of chatting with Daniel Correa, a Security Expert who shared his views on...
Author:
Julian Arango
Category:
attacks
Tags:
security,
risk,
vulnerability,
business,
policies,
economics
Here we conclude our review of 'Measuring the cost of cybercrime' by focusing, among other...
Author:
Julian Arango
Category:
attacks
Tags:
security,
risk,
vulnerability,
business,
policies,
economics
In 2012, the study ‘Measuring the cost of cybercrime’ was presented at the WEIS. Here we...
In the second part of our interview with Nicolás Acosta, he shared his perspective on risk...
Here we compare risk indicators used in quantitative finance, giving their pros and cons. Most...
In this article, we examine how the Antifragility concept can inform design decisions, change...
This blog post is a review of a paper from the adversarial risk analysis field applied to cybersecurity.
Learn how to implement risk management tools and ideas like the loss exceedance curve and...
This blog post is focused on Value at Risk (VaR), a measure of the risk of loss in the context...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.