A Deep Dive Into Serverless Attacks. SLS-6: Security Misconfiguration

A Deep Dive Into Serverless Attacks. SLS-6: Security Misconfiguration

In traditional applications, security misconfiguration can happen at any level of an application stack, including network services, platform, […] The post A Deep Dive Into Serverless Attacks. SLS-6: Security Misconfiguration appeared first ...
Protego's New Pipeline Integration Tool Makes it Simple to Take a "Zero Trust" Approach

Protego Labs Announces Enhancements with New CI/CD Integration Tool

Baltimore, MD – July 10, 2019 – Protego Labs announces an enhancement to the Protego Proact and Protego Function […] The post Protego Labs Announces Enhancements with New CI/CD Integration Tool appeared ...
Zero-Day Attacks in the Serverless Environment

Protego Labs Releases New Feature for Zero-Day Defense

Keeping up with new threats to serverless and cloud native applications is a minute-by-minute task. Although serverless applications […] The post Protego Labs Releases New Feature for Zero-Day Defense appeared first on ...
Broken Access Control in Serverless

Broken Access Control in Serverless Deployments

Maintaining good access control in traditional apps is one of the hardest tasks. It involves both code and configuration. Both in the application and the infrastructure level. With the right serverless security ...

How To Handle Secret Management for Serverless Applications

Like most applications, serverless apps often need access to configuration data in order to function properly. And while most configuration data is non-sensitive, some needs to remain confidential. These strings are known ...
Winter is Coming

Winter is Coming

| | Serverless Security
Whether you align with the North or the South, you have one common enemy, the Night King. The […] The post Winter is Coming appeared first on Protego ...
Who’s on your Starting Lineup?

Who’s on your Starting Lineup?

It’s a new season, everyone is full of hope and optimism that this will be their year- that […] The post Who’s on your Starting Lineup? appeared first on Protego ...
The Evolution of Application Security In The Serverless World

The Evolution of Application Security In The Serverless World

With developers more empowered than ever and infrastructure abstracted away, what is the new role of application security? We sat down with Amit Klein, who is considered by many to be one ...
A Deep Dive into Serverless Attacks, SLS-4:  XML External Entity (XXE) Attacks

A Deep Dive into Serverless Attacks, SLS-4: XML External Entity (XXE) Attacks

Let me first apologize for the long absence. However, I haven’t been idle. I’ve been working hard to […] The post A Deep Dive into Serverless Attacks, SLS-4: XML External Entity (XXE) ...
The 12 Most Critical Risks for Serverless Applications 2019 Guide

The 12 Most Critical Risks for Serverless Applications 2019 Guide

PureSec recently joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. As part of ...
Loading...