Pod Spotlight: Michael Connelly
Life at Orca Security revolves around the Pod - the people who have joined Orca’s mission to make the cloud...
Life at Orca Security revolves around the Pod - the people who have joined Orca’s mission to make the cloud...
As they move into the cloud, security teams continue to be concerned with confidentiality, integrity, and availability of information. Only...
Come party with our Pod! We’re excited to host a number of parties with our partners at this year’s Black...
This post was originally published on The New Stack. Organizations want to move to the cloud to drive innovation and...
Bad.Build is a critical design flaw discovered by the Orca Research Pod in the Google Cloud Build service that enables...
Although it’s always preferable to prevent security incidents before they occur, it’s only a matter of time before an attacker...
Life at Orca Security revolves around the Pod - the people who have joined Orca’s mission to make the cloud...
This post was originally published on The New Stack. Serverless functions, which account for around half of workloads today at...
Recently Amazon Web Services announced their Amazon Verified Permissions service as being generally available. What’s this service for? Is IAM...