Parsing code. Photo by Markus Spiske on Unsplash:

Parse and Conquer

Why Asserts uses Parser combinators

For this blog post, we rely on the following question: Why does Asserts use parser combinators...

multicolor abstract paint on Unsplash:

Seek for Chaos and Dive Into It

The Antifragile philosophy

In this article, we examine how the Antifragility concept can inform design decisions, change...

Chess strategy. Photo by Inactive. on Unsplash:

Great Expectations

What to expect when you're at risk

This blog post is a review of a paper from the adversarial risk analysis field applied to cybersecurity.

Lock on a fence

Secure Cloud as Code

The weakest link in security is not the technology.

Here we want to help you secure your deployments and avoid common mistakes. Infrastructure as...

Broken blue ceramic plate on Unsplash:

The F*CK Strategy

The pratfall effect application on business

Companies should pay attention to how to handle mistakes and think about how to leverage from...

Yellow police line tape on Unsplash:

Do Not Read This Post

What if this post were a malicious link?

In this post, we'll look into the behavior trends of developers when including security in their...

Finance simulation. Photo by M. B. M. on Unsplash:

Quantitative Python

Risk management with Python

Learn how to implement risk management tools and ideas like the loss exceedance curve and...

Fire extinguisher. Photo by Tommaso Pecchioli on Unsplash:

Para Bellum

Prepare for the worst risk

This blog post is focused on Value at Risk (VaR), a measure of the risk of loss in the context...

Baseball hit. Photo by Chris Chow on Unsplash:

Hit or Miss

Estimating attack probability

Here we work based on: What is a beta distribution, and how can it help us estimate the...

New information. Photo by M. Parzuchowski on Unsplash:

Updating your beliefs

How Bayes Rule affects risk

Here you can find how to use Bayes rule and basic probability theory to reduce uncertainty,...

Computer with do what is great sign.

Git on Steroids

From messy logs to Data Analytics

Learn here, among other things, how to define a Git commit message syntax and use real-time...

Numbers notes on Unsplash:

Monetizing Vulnerabilities

From probabilites to dollars and cents

Here we work using calibrated estimates to run a Monte Carlo simulation to obtain the expected...

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy