Visualize findings and get a deeper understanding of your security posture
By Florencia Migliorisi|November 27, 2023|2 MinutesVisualize findings and get a deeper understanding of your security posture Humans, as a species, are visually dominant: the size of the human cortex...
View ArticleFirst steps in cybersecurity: scan your domain
By faradaysec|December 7, 2023|3 MinutesFirst steps in cybersecurity: scan your domain In the era of DevOps and agile methodologies, where delivery speed and constant innovation are commonplace,...
View ArticleFarewell 2023
By faradaysec|December 19, 2023|3 MinutesFarewell 2023 You know the feeling when you feel happy, renewed, and full of energy? That’s how this end of the year feels. We’re not gonna lie; it has been...
View ArticleRelease v5.0.0
By faradaysec|January 5, 2024|2 MinutesRelease v5.0.0 Welcome to another Faraday version! We understand that security is your top priority, and it is our obsession to protect all your digital assets...
View ArticleSADProtocol goes to Hollywood
By faradaysec|January 22, 2024|4 MinutesSADProtocol goes to Hollywood This research project started when Javier’s wife, our ex Research leader, told him their IP camera had stopped working. Javier was...
View ArticleGood practices in Cybersecurity – Part 1
By faradaysec|February 15, 2024|6 MinutesGood practices in Cybersecurity – Part 1 Good practices in cybersecurity, which have a long-lasting positive impact, need to be ingrained in daily routines and...
View ArticleRelease v5.1.1
By faradaysec|February 28, 2024|3 MinutesRelease v5.1.1 Welcome to another Faraday version! For this new release and driven by your valuable feedback, we’ve introduced enhancements that provide full...
View ArticleGood practices in Cybersecurity – Part 2
By faradaysec|March 12, 2024|6 MinutesGood practices in Cybersecurity – Part 2 Different approaches, one common goal: what kind of hacker do I need? Nowadays, we can distinguish various branches within...
View ArticleRelease v5.2.0
By faradaysec|March 27, 2024|3 MinutesRelease v5.2.0 Welcome to another Faraday version! Introducing our latest update for our Risk vulnerability management tool. This time we’ve implemented new...
View ArticleEnhanced Vulnerability Management Guide Using Open-Source Tools
By faradaysec|April 9, 2024|4 MinutesEnhanced Vulnerability Management Guide Using Open-Source Tools In the dynamic world of IT security, proactive vulnerability management is key. This comprehensive...
View ArticleGood practices in Cybersecurity – Part 3
By faradaysec|May 29, 2024|12 MinutesGood practices in Cybersecurity – Part 3 Groundhog Day Security Do you remember “Groundhog Day”? A timeless movie about a cynical weatherman who finds himself...
View ArticleRelease v5.3.2
By faradaysec|June 13, 2024|3 MinutesRelease v5.3.2 Welcome to Faraday v5.3.2! We are thrilled to announce the release of the latest version of our All-in-one Risk vulnerability management platform. We...
View ArticleOur COO Martín Tartarelli talks about Vulnerabilities at UCEMA
By faradaysec|July 11, 2024|1 MinutesOur COO Martín Tartarelli talks about Vulnerabilities at UCEMA Last week, our COO, Martin Tartarelli, offered a master class on vulnerabilities. He thoroughly...
View ArticleUsing Faraday API for Vulnerability Management
By faradaysec|July 17, 2024|6 MinutesUsing Faraday API for Vulnerability Management As in any consulting process, we often find that performing repetitive tasks consumes time that we could invest in...
View ArticleExpanded Attack Surface: How to Optimize Time and Resources in Cybersecurity
By faradaysec|July 29, 2024|4 MinutesExpanded Attack Surface: How to Optimize Time and Resources in Cybersecurity Security teams of all sizes, from large Fortune 500 companies to small NGOs, face the...
View Article