Security testing

Entries with this tag mention different methods and activities to assess software and detect vulnerabilities or other security issues.

Photo by A S on Unsplash

Felipe Ruiz


How can we justify the investment in cybersecurity?

While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.

Photo by Takahiro Sakamoto on Unsplash

Jason Chavarría


Five best practices for coding with the help of gen AI

Generative AI tools are an ally for developers to write code efficiently. We share five best practices for developing software securely while using those tools.

Photo by Peter Neumann on Unsplash

Jason Chavarría


Importance, types, steps, tools of pentesting, and more

Explore the world of penetration testing and gain understanding of how it bolsters your cybersecurity safeguards against emerging threats.

Photo by cdd20 on Unsplash

Jason Chavarría


Impacts of false positives by security software

Losing time on false positives lowers devs' morale, costs money and prevents security teams from responding to real risks. We give details and recommendations.

Photo by Erzsébet Vehofsics on Unsplash

Jason Chavarría


Learn the types, tools, techniques, principles and more

We define security testing and tell you all the basics. These include how to perform it to find vulnerabilities in software applications and other systems.

Photo by Google DeepMind on Unsplash

Felipe Ruiz


Towards an approach that engages more than SCA and SBOM

Understand what a comprehensive software supply chain security approach should aim at and why it is crucial to implement it during your company's SDLCs.

Photo by Rohit Tandon on Unsplash

Felipe Ruiz


Description and critique of CEH certifications

Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"

Photo by charlesdeluvio on Unsplash

Felipe Ruiz


Recognize the value of this security assessment method

We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.

Photo by Ludovic Toinel on Unsplash

Felipe Ruiz


A roadmap for developing and releasing secure software

CISA and other agencies published a guide encouraging organizations to offer their customers secure-by-design and secure-by-default products.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.