All Resources

How hackers earn money

There are yet more ways for hackers to make money. We haven’t even mentioned those paid to commit du
Read More

What You Need to Know About AWS Lambda Functions R

With serverless functions architecture gaining in popularity, it is also becoming clear that the arc
Read More

Announcing General Availability of CloudSploit by

Aqua Security announced the general availability of CloudSploit by Aqua for Google Cloud Platform (G
Read More

CloudSploit Delivers Best Practices for Oracle Clo

Our customers challenged us to add Oracle Cloud Infrastructure (OCI) security to the list of public
Read More

Mitigating High Severity CVEs Affecting SaltStack

Two high-severity CVEs in the SaltStack platform were published last week by researchers at F-Secure
Read More

First Steps in 5G

5G offers a dramatic improvement over 4G’s capabilities. The physical layer specifications began wi
Read More

Migrating Fixed Access to 5G Core

The advent of 5G is seen by many operators as a once-in-a-generation opportunity to converge their n
Read More


;