Good practices in Cybersecurity – Part 1
By faradaysec|February 15, 2024|6 MinutesGood practices in Cybersecurity – Part 1 Good practices in cybersecurity, which have a long-lasting positive impact, need to be ingrained in daily routines and...
View ArticleRelease v5.1.1
By faradaysec|February 28, 2024|3 MinutesRelease v5.1.1 Welcome to another Faraday version! For this new release and driven by your valuable feedback, we’ve introduced enhancements that provide full...
View ArticleGood practices in Cybersecurity – Part 2
By faradaysec|March 12, 2024|6 MinutesGood practices in Cybersecurity – Part 2 Different approaches, one common goal: what kind of hacker do I need? Nowadays, we can distinguish various branches within...
View ArticleRelease v5.2.0
By faradaysec|March 27, 2024|3 MinutesRelease v5.2.0 Welcome to another Faraday version! Introducing our latest update for our Risk vulnerability management tool. This time we’ve implemented new...
View ArticleEnhanced Vulnerability Management Guide Using Open-Source Tools
By faradaysec|April 9, 2024|4 MinutesEnhanced Vulnerability Management Guide Using Open-Source Tools In the dynamic world of IT security, proactive vulnerability management is key. This comprehensive...
View ArticleGood practices in Cybersecurity – Part 3
By faradaysec|May 29, 2024|12 MinutesGood practices in Cybersecurity – Part 3 Groundhog Day Security Do you remember “Groundhog Day”? A timeless movie about a cynical weatherman who finds himself...
View ArticleRelease v5.3.2
By faradaysec|June 13, 2024|3 MinutesRelease v5.3.2 Welcome to Faraday v5.3.2! We are thrilled to announce the release of the latest version of our All-in-one Risk vulnerability management platform. We...
View ArticleOur COO Martín Tartarelli talks about Vulnerabilities at UCEMA
By faradaysec|July 11, 2024|1 MinutesOur COO Martín Tartarelli talks about Vulnerabilities at UCEMA Last week, our COO, Martin Tartarelli, offered a master class on vulnerabilities. He thoroughly...
View ArticleUsing Faraday API for Vulnerability Management
By faradaysec|July 17, 2024|6 MinutesUsing Faraday API for Vulnerability Management As in any consulting process, we often find that performing repetitive tasks consumes time that we could invest in...
View ArticleExpanded Attack Surface: How to Optimize Time and Resources in Cybersecurity
By faradaysec|July 29, 2024|4 MinutesExpanded Attack Surface: How to Optimize Time and Resources in Cybersecurity Security teams of all sizes, from large Fortune 500 companies to small NGOs, face the...
View Article