5 Security Benefits of Configuration as Code (CaC)
CaC can help organizations maintain a secure state across infrastructure, detect and respond to incidents more quickly and maintain compliance ...
How Healthcare Organizations can use ASPM to Fill CSPM Coverage Gaps and Save Money
Health organizations need to adopt an approach that covers both cloud security posture management (CSPM) and application security posture management (ASPM) ...
Orca Security Taps Amazon for Generative AI Expertise
Orca Security is adding LLMs hosted on the AWS cloud to those from Microsoft and OpenAI to provide additional generative AI capabilities to cybersecurity teams ...
API Security’s Role in Protecting Retail Cloud Apps
Protection from API security threats is crucial, especially for retail companies that hold sensitive customer and financial data ...
Cybersecurity Needs to Mitigate Complexity
Complexity is the enemy of security. Akamai’s Steve Winterfeld explains what to do to combat complexity in cybersecurity ...
How to Use ASPM to Improve CSPM
In recent years, organizations have increasingly moved their applications and infrastructure to the cloud to take advantage of its scalability, flexibility and cost-effectiveness. However, this shift to the cloud has also introduced ...
Orca Security Integrates CNAPP With Microsoft GPT Service
Orca Security today announced it has fully integrated its cloud security platform with the Microsoft Azure OpenAI GPT-4 generative artificial intelligence (AI) service to make its simpler to, for example, identify code ...
IT Teams Should Know CNAPP Starts With the Apps
With cloud environments, companies face data protection challenges around more regulations, a higher rate of data loss, and an increase in the number of attacks. As more organizations shift to the cloud, ...
Protecting the Digital Experience
Optimizing digital experience is all the rage today, as the tech industry finally got religion about ensuring end customers—whether external buyers or internal employees—can seamlessly and simply do what they need to ...
GitLab Releases Bevy of Security and Compliance Enhancements
If any good came out of the Log4j vulnerability and SolarWinds attacks, it was the fact that they dramatically increased awareness of software supply chain security. Software supply chain security is only ...