4 Ways to See Orca Security at RSA Conference 2022
RSA Conference 2022 is in San Francisco. Stop by one of these 5 places where Orca Security will be during...
RSA Conference 2022 is in San Francisco. Stop by one of these 5 places where Orca Security will be during...
The Cloud is Yours: a rallying cry for everyone who manages, uses, and secures the cloud, bringing empowerment and transparency...
Cloud security metrics can serve a highly valuable cross-functional role. Learn about the most common scenarios where these metrics can...
Protestware malicious code found in NPM package node-ipc in Russia / Belarus, overwriting entire file systems with heart emojis to...
A GCP Organization is the top node of the permissions hierarchy, making policies defined at this level powerful, automatically applying...
No one outside the IT department cares about vulnerability metrics. They care about efficacy. And traditional stats don’t show that.
Orca researcher Lidor Ben Shitrit reveals how Log4 shell TTPs in an AWS cloud environment can be used to open...
This Kubernetes Hardening Guide addresses security challenges and suggests hardening strategies for four major areas of Kubernetes security.
Learn about the differences between the two vulnerabilities and which one you need to be more concerned about (spoiler alert:...