Integrating Faraday in the software development process – GitLab – Part 4
Vulnerability ManagementPentestingWhitepaper
December 6, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…
Integrating Faraday in the software development process – Jenkins – Part 2
Vulnerability ManagementPentestingWhitepaper
December 5, 2022
We are going to integrate Jenkins into Faraday with pipelines since this is one of the most extended CD/CI tools in the community. DevSecOps
Integrating Faraday in the software development process – GitHub – Part 1
Vulnerability ManagementPentestingWhitepaper
November 29, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…
Top 5 security tips: AWS Cloud Infrastructure
July 28, 2022
Improve your security posture on AWS Read the following recommendations and tips below to avoid these common cloud security issues. Top 5
Securing open source software (Part 2)
CybersecPentestingOpen SourceWhitepaper
July 19, 2022
Open-source software increases its presence in data centers, consumer devices, and applications; also, its community continues to grow. Despite the code being available,…