Dive Deep with the Orca Pod at RSA Conference 2024
At Orca Security, we’re proud to engage with customers, partners, and the cybersecurity community to make the cloud a safer,...
At Orca Security, we’re proud to engage with customers, partners, and the cybersecurity community to make the cloud a safer,...
A malicious backdoor has been discovered in the XZ Utils package, a popular data compression library used in major Linux...
With 84% of vulnerable and exposed TeamCity servers likely already compromised, the recent issue in JetBrains’ TeamCity illustrates how a...
The National Vulnerability Database (NVD), a US government repository of standards-based vulnerability data that enables organizations and cybersecurity solutions to...
Organizations are increasingly leveraging Generative AI and Large Language Models (LLMs) to optimize business processes and improve products and services....
Table of contentsContainer security across the SDLCSDLC Stage 1: Build stage security best practicesSDLC Stage 2: Deployment challenges and best...
Recently, the US National Security Agency (NSA) joined United Kingdom’s National Cyber Security Center (NCSC) in releasing an advisory detailing...
Table of contentsWhat is a CNAPP and why is it the future of cloud security?Criteria #1: Multiple tools in oneCriteria...
Do organizations think? Rarely, if ever. It’s easy to fall into the trap of taking an organization, which can seem,...