
Felipe Ruiz
For a better focus on vulnerabilities to be prioritized
At Fluid Attacks, we believe in the value of the EPSS metric, which is why we have implemented it in our solution, and in this post, we explain it extensively.

Felipe Ruiz
F-scores and accuracy SLA at Fluid Attacks
Fluid Attacks in its ASPM solution offers its customers strict accuracy measures based on F-scores. Find out what it's all about.

Felipe Ruiz
Towards enhanced vulnerability prioritization
In this blog post, you will learn about reachability analysis, a software assessment technique that helps to prioritize vulnerabilities for their remediation.

Felipe Ruiz
How can we justify the investment in cybersecurity?
While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.

Jason Chavarría
Five best practices for coding with the help of gen AI
Generative AI tools are an ally for developers to write code efficiently. We share five best practices for developing software securely while using those tools.

Jason Chavarría
Importance, types, steps, tools of pentesting, and more
Explore the world of penetration testing and gain understanding of how it bolsters your cybersecurity safeguards against emerging threats.

Jason Chavarría
Impacts of false positives by security software
Losing time on false positives lowers devs' morale, costs money and prevents security teams from responding to real risks. We give details and recommendations.

Jason Chavarría
Learn the types, tools, techniques, principles and more
We define security testing and tell you all the basics. These include how to perform it to find vulnerabilities in software applications and other systems.

Felipe Ruiz
Towards an approach that engages more than SCA and SBOM
Understand what a comprehensive software supply chain security approach should aim at and why it is crucial to implement it during your company's SDLCs.