Further Left: Finding Secrets and Package Vulnerabilities Before Build with Orca Security
The fundamental principle of scanning artifacts at build time is, if I can fix a security issue before it’s ever...
The fundamental principle of scanning artifacts at build time is, if I can fix a security issue before it’s ever...
Life at Orca Security revolves around the Pod - the people who have joined Orca’s mission to make the cloud...
The idea of Infrastructure as Code (IaC), or defining how servers and other infrastructure components are built by writing out...
TLDR: As the financial climate has started to shift these past several months, it’s important to have an intentional strategy...
This post was originally published on The New Stack. TLDR: Learn best practices for vulnerability management in the cloud, such...
Cybersecurity never lacks challenges. This was as true as ever in 2022, as IT and security teams entered the year...
It’s been a busy year in cloud security. We’ve seen data breaches, tens of thousands of new vulnerabilities, and an...
Learn about the Joseph Sullivan case and the implications of the Uber breach verdict for CISOs.
Orca’s comprehensive agentless Cloud Security Platform for AWS integrates with Amazon Security Lake by sending Cloud Detection and Response (CDR)...