Cybersecurity talks with our CEO Federico Kirschbaum in Uruguay

Our CEO, Federico Kirschbaum, participated in 'Conciencia…


Maturity Models in Vulnerability Management: Where Are You At?

Since organizations differ in size, structure, and…


Expanded Attack Surface: How to Optimize Time and Resources in Cybersecurity

Security teams of all sizes, from large Fortune 500…


Our COO Martín Tartarelli talks about Vulnerabilities at UCEMA

Last week, our COO, Martin Tartarelli, offered a master…


Good practices in Cybersecurity – Part 3

Good security practices go hand in hand with automation,…


Ten years of cybersecurity, a lifetime of hacking.

Faraday was born from the fusion of entrepreneurial spirit…


Good practices in Cybersecurity – Part 2

Nowadays, we can distinguish various branches within a…


Good practices in Cybersecurity – Part 1

Pentesters use a comprehensive and complete toolkit to…


First steps in cybersecurity: scan your domain

Pentesters use a comprehensive and complete toolkit to…


Visualize findings and understand your security posture

Our risk scoring system goes beyond mere criticality…