s1ngularity Supply Chain Attack: What It Means for Cloud and AI Security
On August 26, 2025, the open-source ecosystem was shaken by a new supply chain attack that targeted Nx, a popular...
On August 26, 2025, the open-source ecosystem was shaken by a new supply chain attack that targeted Nx, a popular...
Gartner has recognized and validated Orca’s cloud security approach by naming us a 2021 Cool Vendor in Cloud Security Posture...
Use these seven questions to make an informed decision and make sure you include the relevant questions below in any...
Announce a 55M USD series B led by ICONIQ Capital, bringing overall Orca Security funding to over $82M in less...
In this match, we put Rapid7 InsightVM into the ring. Rapid7 InsightVM uses a combination of workload agents and network...
In this match, we put Qualys Cloud Platform into the ring. Qualys has added some CSPM features and the majority...
In this match, we put both Palo Alto Networks Prisma Cloud and Prisma Cloud Compute in the ring. Compare the...
Orca Security has developed a unique way to detect weak passwords and protect our clients from brute-force, password-stuffing, and password-spraying...
By combining data collected from your infrastructure and control planes, Orca builds a unified view of your assets in order...
An exposed service account key for a cloud platform can allow attackers to provision new services, control infrastructure, steal data,...