The Importance of CNAPP in Cloud Security and Key Differences Between Platforms

With the blistering adoption of the cloud, combined with increased complexity due to multi-hybrid and SaaS architecture, and the exploding use of containers, serverless and other forms of cloud-native architectures, we need new strategies for securing these complex multi and The post The Importance of CNAPP in Cloud Security and ... Read More

Looking Ahead: Cloud Security and Compliance Trends in 2023

As the new year begins, we wanted to highlight a few trends and predictions we believe will be relevant for organizations when it comes to cloud security initiatives, attacks, and compliance in 2023.  2023 CLOUD SECURITY PREDICTIONS First, let’s cover The post Looking Ahead: Cloud Security and Compliance Trends in ... Read More
ThreatMapper Integrates Steampipe to Enhance Security Observability

ThreatMapper Integrates Steampipe to Enhance Security Observability

Editor’s Note: This post originally appeared on Steampipe’s blog. Deepfence is excited that two of the fastest growing open source projects, ThreatMapper and Steampipe, were able to partner together to offer deep observability for the open source community’s cloud native The post ThreatMapper Integrates Steampipe to Enhance Security Observability appeared ... Read More
Deepfence: 3 Reasons Why I am Excited about Building the Future of Cloud Native Security

Deepfence: 3 Reasons Why I am Excited about Building the Future of Cloud Native Security

Editor’s note: This article was originally published on Writing by Ryan, the personal blog of Deepfence’s Head of Strategic Solutions. We’ve crossposted Ryan’s blog here to share with the Deepfence community. Recently I decided to leave my previous job of The post Deepfence: 3 Reasons Why I am Excited about ... Read More
PII Microsoft Koverse data protection impact assessment DPIA Dell AWS data protection cybersecurity

The Security Imperative: Data Protection

As cyberthreats to supply chain, infrastructure and operational technology (OT)—not to mention rogue activity sponsored by nation-states—continue to increase, there is one constant: Good data protection has never been more critical. Successful data protection consists of strategic security forethought, solid implementation, good practices and, most importantly, an edict from the ... Read More
Security Boulevard