Meet IAM APE: An Open Source Tool to Simplify AWS IAM Policy Management
We're excited to announce the release of our new free community cloud security tool IAM AWS Policy Evaluator (IAM APE),...
We're excited to announce the release of our new free community cloud security tool IAM AWS Policy Evaluator (IAM APE),...
We are pleased to announce the launch of our new Attack Path Analysis capabilities, as part of our ongoing efforts...
Wait, did you say ‘Cross-Cloud Provider Attacks’? Yes, this is actually a growing type of attack path: As organizations increasingly...
“Knowing is half the battle…” I’ll admit, I was a big GI Joe fan growing up, and I always loved...
Cloud storage buckets, such as Amazon S3 Buckets, Azure Blob storage and GCP storage buckets, are a popular storage solution...
Securing sensitive data is one of the main focal points of cloud security. Recognizing the importance of protecting data in...
As cloud adoption continues to soar, so does the emergence of more cloud service providers, each offering unique value and...
Risk prioritization is a foundational requirement for effective cloud security. Security platforms typically generate many alerts. When you consider that...
This post was originally published to The New Stack here. There are two approaches to deploying cloud security software. One...