Quantcast
Channel: Faraday
Browsing all 15 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Visualize findings and get a deeper understanding of your security posture

By Florencia Migliorisi|November 27, 2023|2 MinutesVisualize findings and get a deeper understanding of your security posture Humans, as a species, are visually dominant: the size of the human cortex...

View Article


Image may be NSFW.
Clik here to view.

First steps in cybersecurity: scan your domain

By faradaysec|December 7, 2023|3 MinutesFirst steps in cybersecurity: scan your domain In the era of DevOps and agile methodologies, where delivery speed and constant innovation are commonplace,...

View Article

Image may be NSFW.
Clik here to view.

Farewell 2023

By faradaysec|December 19, 2023|3 MinutesFarewell 2023 You know the feeling when you feel happy, renewed, and full of energy? That’s how this end of the year feels. We’re not gonna lie; it has been...

View Article

Image may be NSFW.
Clik here to view.

Release v5.0.0

By faradaysec|January 5, 2024|2 MinutesRelease v5.0.0 Welcome to another Faraday version! We understand that security is your top priority, and it is our obsession to protect all your digital assets...

View Article

Image may be NSFW.
Clik here to view.

SADProtocol goes to Hollywood

By faradaysec|January 22, 2024|4 MinutesSADProtocol goes to Hollywood This research project started when Javier’s wife, our ex Research leader, told him their IP camera had stopped working. Javier was...

View Article


Image may be NSFW.
Clik here to view.

Good practices in Cybersecurity – Part 1

By faradaysec|February 15, 2024|6 MinutesGood practices in Cybersecurity – Part 1 Good practices in cybersecurity, which have a long-lasting positive impact, need to be ingrained in daily routines and...

View Article

Image may be NSFW.
Clik here to view.

Release v5.1.1

By faradaysec|February 28, 2024|3 MinutesRelease v5.1.1 Welcome to another Faraday version! For this new release and driven by your valuable feedback, we’ve introduced enhancements that provide full...

View Article

Image may be NSFW.
Clik here to view.

Good practices in Cybersecurity – Part 2

By faradaysec|March 12, 2024|6 MinutesGood practices in Cybersecurity – Part 2 Different approaches, one common goal: what kind of hacker do I need? Nowadays, we can distinguish various branches within...

View Article


Image may be NSFW.
Clik here to view.

Release v5.2.0

By faradaysec|March 27, 2024|3 MinutesRelease v5.2.0 Welcome to another Faraday version! Introducing our latest update for our Risk vulnerability management tool. This time we’ve implemented new...

View Article


Image may be NSFW.
Clik here to view.

Enhanced Vulnerability Management Guide Using Open-Source Tools

By faradaysec|April 9, 2024|4 MinutesEnhanced Vulnerability Management Guide Using Open-Source Tools In the dynamic world of IT security, proactive vulnerability management is key. This comprehensive...

View Article

Image may be NSFW.
Clik here to view.

Good practices in Cybersecurity – Part 3

By faradaysec|May 29, 2024|12 MinutesGood practices in Cybersecurity – Part 3 Groundhog Day Security Do you remember “Groundhog Day”? A timeless movie about a cynical weatherman who finds himself...

View Article

Image may be NSFW.
Clik here to view.

Release v5.3.2

By faradaysec|June 13, 2024|3 MinutesRelease v5.3.2 Welcome to Faraday v5.3.2! We are thrilled to announce the release of the latest version of our All-in-one Risk vulnerability management platform. We...

View Article

Image may be NSFW.
Clik here to view.

Our COO Martín Tartarelli talks about Vulnerabilities at UCEMA

By faradaysec|July 11, 2024|1 MinutesOur COO Martín Tartarelli talks about Vulnerabilities at UCEMA Last week, our COO, Martin Tartarelli, offered a master class on vulnerabilities. He thoroughly...

View Article


Image may be NSFW.
Clik here to view.

Using Faraday API for Vulnerability Management

By faradaysec|July 17, 2024|6 MinutesUsing Faraday API for Vulnerability Management As in any consulting process, we often find that performing repetitive tasks consumes time that we could invest in...

View Article

Image may be NSFW.
Clik here to view.

Expanded Attack Surface: How to Optimize Time and Resources in Cybersecurity

By faradaysec|July 29, 2024|4 MinutesExpanded Attack Surface: How to Optimize Time and Resources in Cybersecurity Security teams of all sizes, from large Fortune 500 companies to small NGOs, face the...

View Article

Browsing all 15 articles
Browse latest View live