How Orca’s Cloud Security Solution Detects Weak Passwords

Weak passwords are detrimental to any organization’s security. This holds for commonly used passwords, passwords that are complex but are reused across services and applications, and even highly secure passwords that have been leaked.

Read More...

Not all Risks are Equal: Why Context Matters in Cloud Security

Provisioning assets in the cloud has never been easier and with this, Gartner estimates that 90% of organizations will share sensitive data due to uncontrolled public cloud usage over the next six years. As deployments grow more complex, so too ...

Read More...

Unlocking the Key to the Cloud

Managing keys to assets and data in cloud deployments have become a key concern for many organizations. As explained by Kenneth Hui, a Solutions Architect at Rubrik, paraphrasing Kerckhoffs Principle, poor key management is “like having a state ...

Read More...

How to Rein In Your Unmanaged Cloud in 4 Steps

The prevalence of migration to the cloud highlights the catch-22 of cybersecurity: the security vs. convenience tradeoff. But it doesn’t have to be this way.

Read More...

Debunking the Myths Associated with Migrating to the Cloud & Cloud Visibility

Gartner lists cloud computing as one of the top technology investments for the next five years, and the global public cloud computing market is set to reach $258 billion in 2019. The ability to access data from anywhere is the top reason for ...

Read More...

The 5 Security Challenges in the Cloud

Security Challenges Facing Cloud Deployments

In the cloud, code is deployed at an increasingly neck-breaking speed. As a result, bugs, security holes, and critical errors (sometimes human) are becoming both more likely and more devastating. ...

Read More...

4 Questions to Take Your Cloud Security Posture Management (CSPM) to the Next Level

Data breaches through mismanagement and misconfigurations in the cloud are becoming commonplace. Gartner has predicted that “through 2022, at least 95% of cloud security failures will be the customer’s fault.” In fact, nearly all successful ...

Read More...

How to Optimize Security within Your Cloud Environment

We live in a cloud-first world. The global cloud computing market is expected to grow to more than $600 billion by 2023, exceeding the GDP of the twentieth largest economy in the world, Switzerland. And yet, 66% of IT pros say that security in ...

Read More...

Why Network Scanners Are Lost in the Cloud and What to Do About it

Network scanners have been around for quite a while, with Qualys developing the first network scanner in 1999. Today, they’re still going strong; Qualys, Tenable and Rapid7, all offer powerful network scanners. Since the onset of scanning in the ...

Read More...

Why Detection Rate is the Incorrect Metric

Detection rate is the first metric that comes to mind when discussing cybersecurity effectiveness. Everyone wants a higher detection rate –  we’re naturally inclined to view a product that detects 99.7% of threats as superior to one that detects ...

Read More...