Posts with this tag address the possibility of exposure, damage or loss of assets in organizations due to security weaknesses and cyber threats.

Photo by FlyD on Unsplash

Wendy Rodriguez

Software supply chain management in financial services

The financial sector's software supply chain is a difficult undertaking to manage. But it is a possible task. We discuss threats, trends and provide advice.

Photo by Christian Wiediger on Unsplash

Wendy Rodriguez

The need to enhance security within the fintech sector

Fintechs are disrupting the financial services sector, creating cybersecurity challenges. Here is its current landscape and best practices for the sector.

Photo by Claudio Schwarz on Unsplash

Wendy Rodriguez

Is your financial service as secure as you think?

Organizations providing financial services are prime targets for cybercrime. Learn why, which threats lurk, and how we can help.

Photo by mitchell kavan on Unsplash

Wendy Rodriguez

Bringing the zero trust model to life

ZTNA, an element of the zero trust model, makes access management simple and secure for everyone involved.

Photo by Brian Kelly on Unsplash

Felipe Ruiz

We need you, but we can't give you any money

We want to persist in raising awareness about the scarce support that many open-source software projects, on which nearly everyone depends, are receiving.

Photo by Sean Pollock on Unsplash

Wendy Rodriguez

Data breaches that left their mark on time

A look back at these ill-intentioned attacks that made us grateful they weren't directed towards our organizations.

Photo by Roy Muz on Unsplash

Felipe Ruiz

Lessons learned from black swans

There are also "black swans" in cybersecurity. We can run into one of them at any time, so we must be prepared.

Photo by Florian Schmetz on Unsplash

Wendy Rodriguez

The best offense is a good defense

Proactive prevention is the best strategy against ransomware attacks. That’s why we compiled the best practices to prevent this malicious act.

Photo by Valery Fedotov on Unsplash

Felipe Ruiz

A digital infrastructure issue that many still ignore

The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.