• English
  • Contact
  • Support
  • Login
Orca Security Orca Security
  • Platform
    • Back Platform

      Cloud Security Platform

      • SideScanning™ TechnologyComplete cloud coverage without agents
      • Context-Aware SecurityPrioritize the 1% of alerts that matter
      • Built-in ComplianceContinuous compliance with a single platform
      • Automation & CustomizationGet actionable intelligence to the right teams
  • Solutions

    Back Solutions

    Solutions by

    • Use Case
      • Back Use Case

        Use Case

        • Vulnerability ManagementDiscover and prioritize vulnerabilities in the cloud
        • Malware DetectionCloud malware detection with no performance impact
        • MisconfigurationsFix misconfigurations before attackers find them
        • Lateral Movement RiskExpose hidden lateral movement risk
        • Identity and Access ManagementDiscover common and obscure IAM misconfigurations
        • Sensitive Data DetectionLocate misplaced and unprotected sensitive data
        • Shift Left SecurityComprehensive security across the full software development lifecycle
    • Industry
      • Back Industry

        Industry

        • Financial ServicesAgentless multi-cloud security and compliance at scale
        • Technology ServicesFlexible multi-cloud security with unlimited visibility
        • Media & EntertainmentSimplify security and compliance with a single platform
        • HealthcareCloud security and HIPAA compliance
        • RetailSecurity and PCI compliance at cloud scale
    • Role
      • Back Role

        Role

        • DevOpsCloud security that keeps DevOps agile
        • Security PractitionersAgentless security deployed in minutes
        • CISOHolistic cloud security for effective risk management
  • Partners

    Back Partners

    Become a partner
    Join the program ->
      • Partner OverviewHelping partners across the globe grow their business
      • Technology Ecosystem
        • Amazon Web Services
        • Microsoft Azure
        • Google Cloud
  • About

    Back About

    Join our team
    See Open Positions ->
      • Why Orca?What sets us apart
      • About UsSecurity built for the cloud
      • CareersFind your next job at Orca
      • FAQsAll your Orca questions answered
      • Rating & ReviewsSee how Orca is rated by your peers
      • Orca Research PodAdvancing cloud security
      • NewsroomOrca Security news and coverage
      • Media KitOrca Security press materials
      • Contact UsContact Orca Security
  • Resources

    Back Resources

    Cloud Security Risk Assessment Orca Security’s Free Risk Assessment and Trial
    Get started today ->
      • Resource LibraryOrca videos, reports and white papers
      • Product InfoOrca product literature and videos
      • EventsUpcoming Orca events and webinars
      • PodcastHear from IT security leaders
      • BlogExpand your cloud security knowledge
      • Cloud Risk EncyclopediaBrowse information on 1200+ cloud risks
      • ComparisonsHead-to-head comparison of cloud security solutions
      • Case StudiesLearn why customers use and trust Orca
  • Research

    Back Research

    ORCA RESEARCH
    Orca Research Pod Our team advancing cloud security
    Meet our team ->
    Cloud Risk Encyclopedia Browse information on 1200+ cloud risks
    See the latest risks ->
    • FEATURED RESEARCH
      SynLapse – Technical Details for Critical Azure Synapse Vulnerability
      Read the post ->
    • MORE POSTS
      GCP Organization Policies: Governing Your Inheritance Tohar Braun
      Unfolding the Log4j Security Vulnerability and Log4shell TTPs in AWS Lidor Ben Shitrit
      A Tale About Vulnerability Research and Early Detection Yanir Tsarimi
      See all research ->
  • Test Drive
  • Watch Demo
View more results

All articles by Deborah Galea

Blog

Orca Security Named SC Award Finalist in CSPM and CWPP Categories

Deborah Galea

Deborah Galea May 19, 2022

Blog

Spring4Shell CVE 2022-22965 versus CVE-2022-22963: What’s The Difference?

Deborah Galea

Deborah Galea Mar 31, 2022

Blog

Blog: The Orca Security 2022 Cloud Security Alert Fatigue Report

Deborah Galea

Deborah Galea Mar 15, 2022

Orca Security is sharing a collection of 900+ cloud risks along with remediation strategies for AWS, Azure, and Google Cloud in a Cloud Risk Encyclopedia.

Blog

Orca Cloud Risk Encyclopedia: The Ultimate Resource for Security Practitioners

Deborah Galea

Deborah Galea Feb 02, 2022

Blog

Instantly Detect Log4j Vulnerabilities on AWS, Azure and Google Cloud

Deborah Galea

Deborah Galea Dec 28, 2021

Orca Security roundup of Cybersecurity Leaders and Experts: Where should organizations focus their cloud compliance strategies in 2022?

Blog

Expert Roundup: What Are the Best Cloud Compliance Strategies for 2022?

Deborah Galea

Deborah Galea Dec 27, 2021

Blog

Expert Roundup: How to Respond to Log4Shell

Deborah Galea

Deborah Galea Dec 23, 2021

Blog

Why Your Cloud Workload Protection Platform (CWPP) Will Soon Be a Thing of the Past

Deborah Galea

Deborah Galea Oct 14, 2021

See Orca in action See Orca in action-> View a 10 minute recorded demo or sign up for a personalized one-on-one walk-through.
  • Platform
    • CLOUD SECURITY PLATFORM
      • SideScanning™ Technology
      • Context-Aware Security
      • Built-in Compliance
      • Automation & Customization
    • TECHNOLOGY ECOSYSTEM
      • Amazon Web Services
      • Microsoft Azure
      • Google Cloud Platform
  • Solutions
    • By Use Case
      • Vulnerability Management
      • Malware Detection
      • Misconfigurations
      • Lateral Movement Risk
      • IAM Risk
      • Sensitive Data Detection
      • Shift Left Security
    • By Industry
      • Financial Services
      • Technology Services
      • Media & Entertainment
      • Healthcare
      • Retail
  • Resources
    • Resources
      • Library
      • Product Info
      • Podcast
      • Case Studies
      • Cloud Risk Encyclopedia
      • Blog
      • Events
    • COMPARISONS
      • Cloud Security Posture Managers (CSPM)
      • Prisma Cloud Security
      • Qualys Cloud Agent
      • Twistlock Container Security
      • Redlock Palo Alto
      • Rapid7 InsightVM
      • Check Point CloudGuard Dome9
  • Company
    • Company
      • About
      • Partners
      • Reviews
      • Orca Research Pod
      • Careers
      • Newsroom
      • Media Kit
      • FAQs
    • Contact
      • Support
      • Login
  • Stay in touch

    Get cloud security insights
    and the latest Orca news


Orca Security

©2022 Orca Security. All rights reserved.

  • Privacy Policy
  • Terms of Use