Faraday TeaminFaradayMaturity Models in Vulnerability Management: Where Are You At?Since organizations differ in size, structure, and maturity, there are various vulnerability management models tailored to each. These…Sep 30Sep 30
Faraday TeaminFaradayUsing Faraday API for Vulnerability ManagementAs in any consulting process, we often find that performing repetitive tasks consumes time that we could invest in other activities. At…Jul 23Jul 23
Faraday TeaminFaradayFaraday goes to Defcon: “Taking off the blindfold: Detecting persistent threats on Draytek edge…Faraday goes to #DEFCON 🔥Jul 16Jul 16
Faraday TeaminFaradayExpanding Attack Surface: How to Optimize Time and Resources in CybersecuritySecurity teams of all sizes, from large Fortune 500 companies to small NGOs, face the same problem: a lack of time and an ever-expanding…Jul 11Jul 11
Faraday TeaminFaradayGood practices in Cybersecurity: Red Team, Blue Team, Purple Teams and more! — Part 2Different approaches, one common goal: what kind of hacker do I need?Mar 13Mar 13