Orca Security 2020 State of Virtual Appliance Security Report
This report illuminates major gaps in virtual appliance security, finding many are being distributed with known, exploitable, and fixable vulnerabilities
This report illuminates major gaps in virtual appliance security, finding many are being distributed with known, exploitable, and fixable vulnerabilities
See the security scores for 2,218 virtual appliance images from 540 software vendors.
Proving PCI-DSS compliance for cloud workloads still falls on the organization, as it has in the on-prem world. Here are...
In this match, we put Qualys Cloud Platform into the ring. Qualys has added some CSPM features and the majority...
In this match, we put both Palo Alto Networks Prisma Cloud and Prisma Cloud Compute in the ring. Compare the...
Cloud environments often give external CI/CD services whitelisted access to internal servers, making exploitation way to easy.
Orca Security has developed a unique way to detect weak passwords and protect our clients from brute-force, password-stuffing, and password-spraying...
Cloud environments often give external CI/CD services whitelisted access to internal servers, making exploitation way to easy.
The most important thing I learned in Israeli Unit 8200 was to never assume that existing approaches are the only...