Photo by Google DeepMind on Unsplash

Felipe Ruiz

Towards an approach that engages more than SCA and SBOM

Understand what a comprehensive software supply chain security approach should aim at and why it is crucial to implement it during your company's SDLCs.

Photo by Rohit Tandon on Unsplash

Felipe Ruiz

Description and critique of CEH certifications

Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"

Photo by charlesdeluvio on Unsplash

Felipe Ruiz

Recognize the value of this security assessment method

We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.

Photo by Ludovic Toinel on Unsplash

Felipe Ruiz

A roadmap for developing and releasing secure software

CISA and other agencies published a guide encouraging organizations to offer their customers secure-by-design and secure-by-default products.

Photo by James Beheshti on Unsplash

Jason Chavarría

The basics of cloud security posture management

Cloud security posture management involves vulnerability assessment, prioritization and remediation to secure cloud-based systems and infrastructures.

Photo by Luis Villasmil on Unsplash

Felipe Ruiz

Tips for choosing a vulnerability management solution

If you are still wondering what you should pay more attention to when choosing a vulnerability management solution, we recommend you read this blog post.

Photo by JC Gellidon on Unsplash

Jason Chavarría

Definition, implementation, importance and alternatives

Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.

Photo by Jason Krieger on Unsplash

Felipe Ruiz

Keep tabs on this proposal from the Biden-Harris Admin

Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.

Photo by Tamas Kolossa on Unsplash

Jason Chavarría

Vulnerability scanning and pentesting for a safer web

Learn how website and web app security scanning work, their role in vulnerability management, and why mix them with pentesting in vulnerability assessment.

Inicia tu prueba gratuita de 21 días

Descubre las ventajas de nuestra solución Hacking Continuo, de la cual ya disfrutan cientos de organizaciones.

Inicia tu prueba gratuita de 21 días
Fluid Logo Footer

Hackeando software durante más de 20 años

Fluid Attacks analiza aplicaciones y otros sistemas, abarcando todas las fases de desarrollo de software. Nuestro equipo ayuda a los clientes a identificar y gestionar rápidamente las vulnerabilidades para reducir el riesgo de ciberincidentes y desplegar tecnología segura.

Copyright © 0 Fluid Attacks. We hack your software. Todos los derechos reservados.