Author:
Felipe Ruiz
Category:
politics
Tags:
cybersecurity,
standard,
vulnerability,
information,
company,
challenge
This post is related to vulnerability handling processes (ISO/IEC 30111), complementing the...
Author:
Felipe Ruiz
Category:
politics
Tags:
cybersecurity,
standard,
vulnerability,
information,
company,
challenge
Would you like to get a clearer idea about vulnerability disclosure? Start with reading this...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
vulnerability,
information,
web,
risk,
standard
Here I give you an overview of the recent Colombian Foreign Ministry's security problem and the...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
vulnerability,
standard,
information,
software,
application
This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...
Author:
Felipe Ruiz
Category:
philosophy
Tags:
security,
cybersecurity,
information,
documentation,
standard,
ethical-hacking
Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...
Author:
Daniel Salazar
Category:
documentation
Tags:
git,
software,
documentation,
standard,
engineering,
business,
linters
Learn here, among other things, how to define a Git commit message syntax and use real-time...
Here we explain how to use SAML, a popular SSO implementation standard for logging users into...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
vulnerability,
information,
web,
risk,
standard
Aquí les doy una visión general de la reciente vulnerabilidad de seguridad de la Cancillería...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.