Filter by author:
Filter by tag:
Release date:
Filter by title:
![Photo by Kai Pilger on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1714084288/learn/zero-trust-security/cover_zero_trust_security.webp)
Wendy Rodriguez
Never trust. Always verify.
An overview of the cybersecurity philosophy that inherently says “no” to anyone and anything trying to access a company’s digital resources.
![Photo by Markus Winkler on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1703009792/learn/sbom/cover_sbom_1.webp)
Wendy Rodriguez
What is a software bill of materials?
Find out what a software bill of materials is, what it's used for and how it helps in software creation, resource management and cost budgeting.
![Photo by Sajad Nori on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1700256635/learn/owasp%20samm/cover_owasp_samm_1.webp)
Wendy Rodriguez
The OWASP framework to achieve security maturity
Understand the OWASP SAMM framework to formulate and implement a proactive strategy for software security maturity.
![Photo by Angel Luciano on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1699021846/learn/man%20in%20the%20middle/cover_mitm_1.webp)
Wendy Rodriguez
What is an MITM attack?
Learn what a man-in-the-middle (MITM) attack is, how it works, what the types are and how to prevent them.
![Photo by Andres Dallimonti on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1697814082/learn/configuration%20management/cover_cong_mngmnt_1.webp)
Wendy Rodriguez
Learn about this systems engineering process
Here you’ll find a complete explanation of what is configuration management, key aspects, and the benefits it brings to organizations.
![Photo by Len Cruz on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1696602946/learn/spring4shell/cover_sring4shell_1.webp)
Wendy Rodriguez
What is this Spring framework vulnerability?
Learn what the Spring4Shell vulnerability is, how it could potentially expose your system to cyber-attacks, and tips on how to protect against further security issues in Spring Framework.
![Photo by Egor Myznik on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1695342910/learn/log4j-log4shell/cover_log4j_log4shell_1.webp)
Wendy Rodriguez
Learn about this Log4j vulnerability and how to remediate it
Fluid Attacks helps you learn about the Log4Shell vulnerability, its history, how to detect it and its remediation.
![Photo by Myriam Jessier on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1694439565/learn/aspm/cover_understanding_aspm_1.webp)
Wendy Rodriguez
Understanding ASPM & its contribution to cybersecurity
Application security posture management (ASPM) helps control the security of your applications throughout the entire SDLC.
![Photo by Isaac Quesada on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1693598533/learn/malicious%20code/cover_possible_effects_malicious_code.webp)
Wendy Rodriguez
Learn about this cyber risk
Learn what it is, examples, possible effects and how to prevent propagation.