Use Graph Visualization to Better Explore Interconnected Cloud Risks
“Defenders think in lists. Attackers think in graphs,” is a familiar saying in cybersecurity. Sophisticated attackers perform reconnaissance to find...
“Defenders think in lists. Attackers think in graphs,” is a familiar saying in cybersecurity. Sophisticated attackers perform reconnaissance to find...
We have found that the web-service {service_detailed} on the system was not patched for several months. It is important to...
File excluded from your antimalware scanner at the same time as code was executed via a custom script extension on...
The memory of the process specified below contains evidence of a fileless attack technique. Fileless attacks are used by attackers...
Analysis of host data detected an executable file on host that is running from a location in common with known...
The fundamental principle of scanning artifacts at build time is, if I can fix a security issue before it’s ever...
Life at Orca Security revolves around the Pod - the people who have joined Orca’s mission to make the cloud...
The idea of Infrastructure as Code (IaC), or defining how servers and other infrastructure components are built by writing out...
TLDR: As the financial climate has started to shift these past several months, it’s important to have an intentional strategy...