Orca Security 2020 State of Virtual Appliance Security Report
This report illuminates major gaps in virtual appliance security, finding many are being distributed with known, exploitable, and fixable vulnerabilities
This report illuminates major gaps in virtual appliance security, finding many are being distributed with known, exploitable, and fixable vulnerabilities
See the security scores for 2,218 virtual appliance images from 540 software vendors.
Proving PCI-DSS compliance for cloud workloads still falls on the organization, as it has in the on-prem world. Here are...
In this match, we put Qualys Cloud Platform into the ring. Qualys has added some CSPM features and the majority...
In this match, we put both Palo Alto Networks Prisma Cloud and Prisma Cloud Compute in the ring. Compare the...
It’s hard to separate fact from fiction when evaluating cloud security solutions. The Cloud Security Punch-Out! series puts Orca Security...
The Orca Security team has assembled a list of the top 50 cyber security podcasts, including our rating, show overview,...
For most organizations, cloud workload security is dependent upon the installation and maintenance of security agents across all assets. Something...
Cloud environments often give external CI/CD services whitelisted access to internal servers, making exploitation way to easy.