Posts with this tag address the possibility of exposure, damage or loss of assets in organizations due to security weaknesses and cyber threats.

Photo by JC Gellidon on Unsplash

Jason Chavarría

Definition, implementation, importance and alternatives

Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.

Photo by Jason Krieger on Unsplash

Felipe Ruiz

Keep tabs on this proposal from the Biden-Harris Admin

Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.

Photo by Hunters Race on Unsplash

Felipe Ruiz

Disclosure rules proposed by SEC may soon take effect

We briefly present the amendments to cybersecurity-related disclosure rules proposed by the SEC, their potential benefits and costs, and some recommendations.

Photo by Maxim Hopman on Unsplash

Jason Chavarría

Why measure cybersecurity risk with our CVSSF metric?

We present some of the flaws of the traditional measure of cybersecurity risk and introduce CVSSF, the risk-exposure-based metric with which we overcome them.

Photo by Agê Barros on Unsplash

Felipe Ruiz

Take care of your apps from cybercriminals on the prowl

Here we talk about mobile apps and some of their possible security risks, as well as what MAST is and how it can contribute to app security.

Photo by Sander Sammy on Unsplash

Jason Chavarría

Advice for firms to comply with the HIPAA Security Rule

NIST published the second revision draft to its SP 800-66. Learn about the most significant changes that are being introduced.

Photo by Mathew Schwartz on Unsplash

Jason Chavarría

Enhancing cybersecurity across government entities

Learn about the Federal Rotational Cyber Workforce Program Act of 2021 and the State and Local Government Cybersecurity Act of 2021, which were signed into law.

Photo by Ibrahim Boran on Unsplash

Jason Chavarría

Plans to fund cybersecurity in Latin America and Africa

The U.S. and EU are to fund protection of critical infrastructure in foreign countries, lest China does it first.

Photo by Lucrezia Carnelos on Unsplash

Felipe Ruiz

Chances are you're vulnerable with Microsoft Office

In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.