
Limiting hackers in the cloud
How to limit a hacker’s access to your cloud account? The LAPSUS$ hacking group has been around for a few months now (at least publicly,
How to limit a hacker’s access to your cloud account? The LAPSUS$ hacking group has been around for a few months now (at least publicly,
How to limit a hacker’s access to your cloud account? The LAPSUS$ hacking group has been around for a few months now (at least publicly, based on their achievements they
When it comes to writing security policies in AWS, it pays to be specific. Misconfigured policies can lead to unfortunate data leaks or even breaches, so locking down your AWS environments is a must for every organization. In order for us to write and manage policies securely, we need to
And other tips for avoiding infrastructure security policy misconfigurations
Dynamic solution empowers collaboration between developers and security teams without compromising security
There is that special time in every company’s life…
Gets Recognized for Cloud Identity Governance Solution
Congratulations! You just joined an exciting new project, and you’re getting started setting up your environment
In the past couple of weeks we heard about two interesting incidents of data leakage from Azure blobs.
vpnMentor’s research team published their findings around Pray.com’s data leakage…
nowadays there is a very thin line between Application Security (AppSec) and cloud security.
It is often believed that by using the public cloud, security is someone else’s job. This couldn’t be more wrong. The first thing you must understand when building or migrating to the cloud is the shared responsibility model.
Picture this. One day, you’re working at your desk in the office as usual (remember offices? :-O ). Your boss, Monica, walks up excitedly and breathlessly says, “Guess what? We’re gonna move our flagship app to… THE CLOUD!”