Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Sebastian Pena Lambarri on Unsplash

Everyone Is Responsible for SEC

An overview of DevSecOps, better SecDevOps


Through this blog post, you will know what DevSecOps is, how it applies, and why it is...



Photo by Michael Fenton on Unsplash

Breaking Down DevOps

The central components of DevOps definition


Here we introduce DevOps, a working methodology whose principles are communication,...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Lock on a fence

Secure Cloud as Code

The weakest link in security is not the technology.


Here we want to help you secure your deployments and avoid common mistakes. Infrastructure as...



several balloons floating in the air

Healthcare in the Clouds

Cloud based systems in healthcare and their issues


Cloud-based systems can be of great benefit to healthcare institutions, but they can also lead...



Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy