Common Cloud-Native Security Misconfigurations & Fixes

Credit to Author: Michael Langford| Date: Fri, 30 Sep 2022 00:00:00 +0000

Cloud configuration errors are a major concern for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

Read more

Simplify with Network Security as a Service (NSaaS)

Credit to Author: Duane Seon| Date: Fri, 23 Sep 2022 00:00:00 +0000

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

Read more

CIEM vs CWPP vs CSPM

Credit to Author: Michael Langford| Date: Thu, 08 Sep 2022 00:00:00 +0000

This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to determine when and how to use them—whether individually or in conjunction with one another.

Read more

Top 5 Cloud Security Trends from AWS re:Inforce 2022

Credit to Author: Caitlyn Hughes| Date: Fri, 02 Sep 2022 00:00:00 +0000

With the industry changing so rapidly, it is often hard to keep up with what is new in cloud security, so we thought we would put together a list of the top five cloud security trends we found during AWS re:Inforce 2022.

Read more

Unlocking Serverless with AWS Lambda and IAM

Credit to Author: Braden Collingwood| Date: Thu, 25 Aug 2022 00:00:00 +0000

Learn how Lambda and IAM unlock the power and versatility of the cloud by implementing a serverless User API that can be expanded on as you grow and explore the many services on AWS.

Read more

Detect Threats with Runtime Security

Credit to Author: Jiri Sykora| Date: Tue, 16 Aug 2022 00:00:00 +0000

With the increasing use of multi-cloud infrastructure services security has become more complex. You need simplified security for your cloud-native applications with advanced container image scanning, policy-based admission control, and container runtime protection.

Read more

Event-Driven Architectures & the Security Implications

Credit to Author: Sterling Davis| Date: Fri, 12 Aug 2022 00:00:00 +0000

This article explores event-driven architecture (EDA) with a detailed definition and explains how EDA offers many essential benefits to developers. It concludes with an outline of some best practices for mitigating security concerns.

Read more