The exploitation of a high-severity Kubernetes vulnerability can lead to arbitrary code execution with System privileges on all Windows endpoints…
Category: Cloud Security
Cloud Security
Threat intelligence firm Permiso Security has released an open source tool to help organizations detect cloud environment intrusions by known…
Axonius, a well entrenched player in the attack surface management space, has banked another $200 million in late-stage funding from…
Webinar now available to watch on demand The world of cloud security is changing rapidly, and security professionals like you…
Redefining Perimeter Security: The Decline of Traditional Security Appliances and the Rise of Cloud-Native Solutions
Security appliances have been traditionally considered one of the most effective forms of perimeter security. That said, this is no…
Google Kubernetes Engine at Risk: Vulnerabilities Allow Cluster Takeover Scenarios
Palo Alto Networks, a cybersecurity firm, has reported that an attacker with access to a Kubernetes cluster could exploit two…
Shielding Corporate Clouds: Elite Defenders Safeguard Against Malicious Mavericks
The transition to the Cloud has always been a priority, but the recent acceleration caused by COVID-19 has brought new…
Groundbreaking AI Safety Initiative Establishes Responsible Guidelines for Artificial Intelligence
Multiple prominent artificial intelligence software vendors have joined forces with the Cloud Security Alliance (CSA), a not-for-profit organization, to establish…
Cisco Expands Cloud Footprint with Isovalent Acquisition and eBPF Integration
Cisco has announced its plans to acquire Isovalent, a networking and security startup based in Silicon Valley. The financial terms…