Using the MITRE ATT&CK Framework to Strengthen Cloud Security
To manage the risks in today’s cloud threat landscape, defenders are faced with a number of day-to-day responsibilities – investigating...
To manage the risks in today’s cloud threat landscape, defenders are faced with a number of day-to-day responsibilities – investigating...
The RSA Conference is an opportunity for cybersecurity professionals to come together to connect with each other and gain new...
Gartner® just published its 2023 Market Guide for Cloud-Native Application Protection Platforms (CNAPPs), in which it shares important insights about...
Life at Orca Security revolves around the Pod - the people who have joined Orca’s mission to make the cloud...
Earlier this year, I had the pleasure of speaking with Caroline Wong from Cobalt and Jason Lane from Snyk on...
By now, you’ve read Part I of How to CISO in the Cloud, and its accompanying blog. And hopefully, you’ve...
This post was originally published to The New Stack here. The number of hackers learning to use web applications and...
We're excited to announce the release of our new free community cloud security tool IAM AWS Policy Evaluator (IAM APE),...
We are pleased to announce the launch of our new Attack Path Analysis capabilities, as part of our ongoing efforts...