• English
  • Search
  • Contact
  • Login
    • USA
    • Europe
    • Australia
    • US-Gov
  • The Orca Platform

    Secure cloud infrastructure, workloads, data, APIs, and identities with our industry-leading agentless platform.

    • Platform Overview
    • Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    • Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    • Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    • Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
    • Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical risks
    • Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    • Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom checks
    • Shift Left Security
      Secure cloud-native apps across the SDLC
    • SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    • API Security
      Complete API discovery, security posture management, and drift detection
    • Data Security and Posture Management
      Reduce the risk of data breaches and protect sensitive PII
  • Case Studies

    Orca Security is trusted by the most innovative companies across the globe.

    • Browse Case Studies

    Industries

    • Financial Services
    • Technology
    • Government
    • Retail
    • Healthcare
    • Media & Entertainment

    User Roles

    • CISO
    • Security Architect
    • DevOps

    Orca Powers Cloud Security for Digital Turbine.

    Read Case Study

    Insurance Innovator Lemonade Goes from 0 to 100% Cloud Visibility with Orca Security.

    Read Case Study

  • Our Partners

    Our team is extended and strengthened by our strong partnerships across the Cloud Security ecosystem.

    • Partner Overview
    • Join the Program
    • Amazon Web Services
    • Microsoft Azure
    • Google Cloud
    • Alibaba Cloud
    • Oracle Cloud
  • Orca Research Pod

    Our expert security research team discovers and analyzes cloud risks and vulnerabilities to strengthen the Orca platform.

    • See Our Latest Discoveries

    Orca Research

    How Orca Found SSRF Vulnerabilities in Four Different Azure Services

    CosMiss: Azure Cosmos DB Notebook Remote Code Execution Vulnerability

    Cloud Risk Encyclopedia - Browse Thousands of Cloud Risks

  • Resource Library

    Download and view eBooks, whitepapers, videos and more in our packed Resource Library.

    • Browse Resources

    Blog

    Read Cloud Security thought leadership, how-to's, and insightful posts from Orca Security experts.

    • Browse Blogs
    • Cloud Risk Encyclopedia
    • Product Articles & Videos
    • Comparisons
    • Events & Webinars
    • Podcasts
    • Customer Support
  • Our Customers

    Orca Security is trusted by the most innovative companies across the globe.

    • Browse Case Studies
    • Why Orca
    • About Us
    • Newsroom
    • Ratings & Reviews
    • Media & Press
    • Careers
    • FAQs
    • Contact Us
  • English
  • Search
  • Contact
  • Login
    • USA
    • Europe
    • Australia
    • US-Gov
  • Free Trial
  • Get Demo
View more results

All articles by Jason Silberman

Blog

Why You Should Read Agentless Cloud Security For Dummies

Jason Silberman

Jason Silberman Sep 21, 2022

The Open Web Application Security Project (OWASP) API Security Top 10 focuses on understanding and mitigating vulnerabilities and security risks of APIs.

Blog

Why You Should Know the OWASP API Security Top 10

Jason Silberman

Jason Silberman May 25, 2022

The Orca Security Score works like a report card for your cloud security posture.

Blog

Orca Security Score: Benchmark Your Cloud Security Posture

Jason Silberman

Jason Silberman Feb 10, 2022

See Orca in action See Orca in action-> View a 10 minute recorded demo or sign up for a personalized one-on-one walk-through.
  • Platform

    • CLOUD SECURITY PLATFORM

      • Platform
      • SideScanning™ Technology
      • Context-Aware Security
      • Built-in Compliance
      • Automation & Customization
    • TECHNOLOGY ECOSYSTEM

      • Amazon Web Services
      • Microsoft Azure
      • Google Cloud Platform
  • Solutions

    • By Solution

      • Malware Detection
      • Vulnerability Management
      • Sensitive Data Detection
      • Container and Kubernetes Security
      • Multi-Cloud Compliance and Security
      • Cloud Security Posture Management (CSPM)
      • CIEM
      • Cloud Workload Protection Platform (CWPP)
      • Cloud Detection and Response (CDR)
      • Shift Left Security
      • API Security
      • Data Security and Posture Management (DSPM)
    • By Industry

      • Financial Services
      • Technology Services
      • Media & Entertainment
      • Healthcare
      • Retail
  • Resources

      • Library
      • Product Info
      • Podcast
      • Case Studies
      • Cloud Risk Encyclopedia
      • Blog
      • Events
    • COMPARISONS

      • Prisma Cloud Security 2022
      • Qualys Cloud Agent
      • Twistlock Container Security
      • Redlock Palo Alto
      • Rapid7 InsightVM
      • Check Point CloudGuard Dome9
  • Company

      • About
      • Partners
      • Reviews
      • Orca Research Pod
      • Careers
      • Newsroom
      • Media Kit
      • FAQs
    • Contact
      • Support
      • Login
  • Stay in touch

    Get cloud security insights
    and the latest Orca news


Orca Security

©2023 Orca Security. All rights reserved.

  • Privacy Policy
  • Terms of Use