Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Integrating Faraday in the software development process – GitLab – Part 4

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More


Integrating Faraday in the software development process – Jenkins – Part 2

We are going to integrate Jenkins into Faraday with pipelines since this is one of the most extended CD/CI tools in the community. DevSecOps

Read More


Integrating Faraday in the software development process – GitHub – Part 1

Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…

Read More


Top 5 security tips: AWS Cloud Infrastructure

Improve your security posture on AWS Read the following recommendations and tips below to avoid these common cloud security issues. Top 5

Read More


Securing open source software (Part 2)

Open-source software increases its presence in data centers, consumer devices, and applications; also, its community continues to grow. Despite the code being available,…

Read More