Tools Resources
Cloud Alphabet Soup

Cloud Alphabet Soup Examining CSPM, DSPM, KSPM, and CNAPP

becca
By: Becca Gomby
Oct 24, 2024

Cloud native applications are dominating the tech landscape for modern enterprises. A garden-variety cloud native application consists of microservices deployed in containers orchestrated with Kubernetes, and these microservices interact together vi...

CI CD Pipelines@2x

Securing Continuous Integration and Delivery Pipelines

becca
By: Becca Gomby
Oct 18, 2024

Modern software development teams will have individual preferences about whether to use IDEs or which testing framework or coding convention to adopt. However, for teams that want to deliver high-quality software at a rapid pace, continuous integrat...

ciem

The Essential Role of CIEM: Stopping Multi-Cloud Identity-based Threats

becca
By: Becca Gomby
Oct 4, 2024

Enterprises are increasingly adopting multi-cloud environments to take advantage of the flexibility and scalability of different cloud platforms. However, this shift has also introduced a major security challenge: the rise of identity-based threats....

ciem

Navigating Complex Cloud Environments with CIEM

becca
By: Becca Gomby
Sep 27, 2024

Securing complex cloud environments is as crucial as it is challenging. The surface area for attack is vast. With the elastic nature of cloud resources, a single compromised service could allow attackers to take over large portions of your infrastru...

Person in hoodie sitting in front of a laptop with external monitor, looking at code

Thought your Node.js latest Docker image was safe?

jan
By: Jan Schulte
Oct 12, 2023

For all developers who run containerized JavaScript workloads in production: Is relying on node:latest as your base image a safe choice? It's effective from a developer productivity standpoint as you're up and running quickly. Have you ever wond...

fig2-attack-paths-Panoptica

Technical Deep Dive of Cloud Environment Graphs and Attack Paths 

Roy Maor
By: Roy Maor
Jan 9, 2023

In this article, we will break down the complex orchestration required to form a cloud environment graph and utilize it for detection and prioritization of attack paths. One of the most valuable security outputs that cloud owners can unlock through ...

Map-5

Understanding Attack Paths and Attack Path Analysis in a Stateful Cloud Environment Graph 

Roy Maor
By: Roy Maor
Jun 30, 2021

Attack path analysis can be a complex beast. We’ve spoken in the past about how a graph-based approach to security risk analysis can elevate your cloud security posture overall. Check out this previous article to learn about the building blocks of...

cloud-visibility-header

Can There Be Too Much Cloud Visibility in a Cloud Environment?

Vladi Sandler
By: Vladi Sandler
Apr 19, 2021

Everywhere you look in cloud security, you’ll see experts waxing lyrical about the importance of visibility. Trust us, we get it! If you can’t get an active and accurate view of everything that’s going on inside your environment, from con...