Dependency Confusion Supply Chain Attacks: 49% of Organizations Are Vulnerable
In recent years, supply chain attacks targeting software developers and suppliers have become increasingly common. The primary objective of these...
In recent years, supply chain attacks targeting software developers and suppliers have become increasingly common. The primary objective of these...
If you attended Orca Security’s premier virtual summit Cloud Security LIVE in 2022, then you’ll remember that we had some...
Since we integrated GPT-3 into the Orca Cloud Security Platform in January this year, we have not been sitting still...
Last year, the Cybersecurity and Infrastructure Security Agency (CISA) released its 2022 Cross-Sector Cybersecurity Performance Goals in order to provide...
Life at Orca Security revolves around the Pod - the people who have joined Orca’s mission to make the cloud...
Organizations are continuing full speed ahead in moving much of their sensitive data to the cloud. Cybersecurity Ventures predicted in...
AWS Summits are a series of in-person and online events taking place around the world to teach the cloud computing...
With organizations continuing digital transformation efforts and public cloud adoption breaking down traditional network barriers, misconfigurations surrounding cloud identities and...
At RSAC 2023, Oren Sade and I will be presenting a delightful talk about how to take a technical analysis...