sc-media-featured

Nine best practices for secrets management in the cloud

Secrets management refers to the practice of handling sensitive data such as passwords, API keys, encryption keys, and certificates, which...

Team Solvo
|
Jul 12, 2024
Helpnet-security-featured

Solvo SecurityGenie helps organizations improve their cloud security posture

Cloud security breaches are a major threat to organizations with an average detection time of 277 days and human error...

Team Solvo
|
Sep 26, 2023
Silicon-angle-featured

Solvo introduces SecurityGenie, a prompt-based cloud security solution

Adaptive cloud infrastructure security solutions startup Solvo today announced the launch of SecurityGenie, a prompt-based cloud security solution with instant...

Team Solvo
|
Sep 26, 2023

Media Coverage

sc-media-featured

Nine best practices for secrets management in the cloud

Secrets management refers to the practice of handling sensitive data such as passwords, API keys, encryption keys, and certificates, which are essential...

Learn more
sc-media-featured

Seven best practices for managing non-human identities

In today’s ever-evolving IT landscape, identity and access management (IAM) extends beyond human users to include a wide range of non-human identities...

Learn more
spgmi-logo-min

Solvo tackles CNAPP with adaptive cloud security and deep application analysis

“Israel-based Solvo is a vendor that combines elements of cloud security posture management (CSPM) and cloud infrastructure entitlement management (CIEM) into a...

Learn more
dark-reading-featured

7 Critical Cloud Threats

“Securing the cloud has been an unwieldy and daunting task since the beginning: The idea of using an enterprise architecture built on...

Learn more
INFORMATIONWEEK

Preparing for Compliance With AI, Data Privacy Laws

The importance of data privacy laws in the United States and the European Union (EU) are rapidly growing and their impact on...

Learn more
securityWeek-featured

Cyber Insights 2023: Attack Surface Management

ASM is not a novel idea and has existed as long as there have been things to protect from attacks. With the...

Learn more
venture-featured

As public cloud use increases, security gaps widen

As cloud adoption soars, businesses are grappling with expanding cloud footprints and the surge in data storage. The public cloud, valued for...

Learn more
sc-media-featured

Four lessons learned from the latest Uber breach

The recent third-party data breach experienced by Uber through its vendor Teqtivity and highlights valuable lessons that organizations can learn to prevent...

Learn more
Geektime-featured

To Ease the Pains of Cybersecurity, Listen to the Needs of Users First

Frustration is a common sentiment among IT and security teams when managing the people, processes and solutions that emerge alongside cloud adoption....

Learn more
INFORMATIONWEEK

CISOs Mark Data Proliferation as Growing Security Problem

As organizations scale, their data spreads across various platforms, making it harder to maintain security and oversight. The blog underscores the high...

Learn more

Empower your security team with the autonomy they need.

Or let us show you around with a demo

Request a demo