Blogs

The 3 Riskiest Cloud Native AWS Configurations

With dozens of key security configurations possible for EC2 alone, the number of configuration optio
Read More

How to Use Selenium Grid in the Cloud

Selenium Grid is part of the Selenium testing suite. It enables parallel testing on different machin
Read More

What You Need to Know About AWS Lambda Functions R

With serverless functions architecture gaining in popularity, it is also becoming clear that the arc
Read More

Announcing General Availability of CloudSploit by

Aqua Security announced the general availability of CloudSploit by Aqua for Google Cloud Platform (G
Read More

CloudSploit Delivers Best Practices for Oracle Clo

Our customers challenged us to add Oracle Cloud Infrastructure (OCI) security to the list of public
Read More

Mitigating High Severity CVEs Affecting SaltStack

Two high-severity CVEs in the SaltStack platform were published last week by researchers at F-Secure
Read More

Vulnerability in Containerd Can Leak Cloud Credent

A new vulnerability was found in containers, located in the container image-pulling process. The new
Read More


;