AWS Network Firewall: Analyzing External Exposure to Effectively Prioritize Risks
Even a cursory read of the 2025 State of Cloud Security Report reveals that security teams are contending with more...
Even a cursory read of the 2025 State of Cloud Security Report reveals that security teams are contending with more...
We’re pleased to announce that Orca Security will expand the existing integration with AWS Security Hub CSPM to support the...
Open-source software has risen dramatically in popularity, driving a completely new approach to building, and therefore securing, applications. While the...
When we first announced the Orca MCP Server, we showed some examples with Claude and with Cursor. In this blog,...
According to the Orca Research Pod, attackers routinely scan public code repositories for secrets and can discover and exploit them...
GenAI has fundamentally disrupted how we work and how we deliver value to customers. Today, Orca is proud to announce...
Today, we’re excited to release the 2025 State of Cloud Security Report, which reveals deep insights uncovered by the Orca...
According to a recent World Economic Forum’s Global Cybersecurity Outlook 2025 report, software supply chain vulnerabilities are the leading cybersecurity...
According to VulnCheck, exploitation of publicly disclosed CVEs rose by 20% year-over-year in 2024. This trend reflects a broader rise...