Security Testing

Entries with this tag mention different methods and activities to assess software and detect vulnerabilities or other security issues.

Photo by JC Gellidon on Unsplash

Jason Chavarría


Definition, implementation, importance and alternatives

Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.

Photo by Jason Krieger on Unsplash

Felipe Ruiz


Keep tabs on this proposal from the Biden-Harris Admin

Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.

Photo by Tamas Kolossa on Unsplash

Jason Chavarría


Vulnerability scanning and pentesting for a safer web

Learn how website and web app security scanning work, their role in vulnerability management, and why mix them with pentesting in vulnerability assessment.

Photo by Alexander Ant on Unsplash

Felipe Ruiz


Definitions, classifications and pros and cons

Learn what vulnerability scanners and vulnerability scanning are, what their classifications are, and what their pros and cons are.

Photo by John Schnobrich on Unsplash

Jason Chavarría


Is your security testing covering the right risks?

You need to prioritize the security testing techniques that cover the actual threats you're facing. We explain how Lumu's MITRE ATT&CK® Global Matrix can help.

Photo by Marino Linic on Unsplash

Felipe Ruiz


How this process works and what benefits come with it

Learn about the vulnerability management process, its stages, and the benefits your organization can obtain by implementing it.

Photo by Saketh Upadhya on Unsplash

Felipe Ruiz


Get an overview of vulnerability assessment

Learn what vulnerability assessment is, why this IT systems evaluation process is important, what types exist, and how it relates to vulnerability management.

Photo by Anchor Lee on Unsplash

Jason Chavarría


Benefits of continuous over point-in-time pentesting

Continuous penetration testing beats periodic point-in-time pen tests. We present its benefits and how we overcome challenges to its implementation.

Photo by Thomas Griggs on Unsplash

Jason Chavarría


Pentesting is a system-agnostic approach to security

The types of penetration testing include external and internal network, wireless, IoT, mobile application and social engineering pentesting. Learn more here.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.