Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ARMO

What COVID-19 teaches us about Micro-segmentation and Run-time Cloud Workload Protection

March 2020, the Coronavirus is pretty much everywhere. As I am writing these lines, the number of cases worldwide is 341,334 and 192 different countries have experienced infections.The world is fighting this epidemic and travel limitations are widely used in order to control the spread of the disease. While some say these restrictions are critical, others claim it to be ineffective and redundant. I am not an epidemiologist and will leave that analysis to the experts.

Recently found Azure vulnerabilities underline the importance of Zero-Trust for cloud workloads

Check Point researchers recently published two vulnerabilities they’d found in Microsoft’s Azure cloud services. These flaws highlight a wave of potential attacks on cloud infrastructure and the exposure of workloads running in multi-tenant cloud environments.

Do you trust your Microservices Identities?

Microservices provide great benefits to development organizations. They enable multiple autonomous development teams to work on the same application, maintaining efficiency,speed, and utilization of modern resources such as open source, containers and programming languages. The Microservice paradigm simplifies application building,debugging, management, deployment, scalability and of course time to market.

The Migration Path to Microservices & Security Considerations, Of Course

While the move to microservices-based architecture is relatively new, it is already mainstream. A majority of companies are choosing it as their default architecture for new development,and you are not cool if you are not using microservices. With regards to migrating legacy apps and breaking them down to microservices, companies are showing more conservatism, and rightly so.

Cloud Migration: Moving Your Security Mindset Along with Your Data

Migrating our data to the cloud to digitally transform and streamline your IT environment is easier than ever. Cloud security is in a place where it is stronger than on-premise security and The Big Three – AWS, Microsoft, and Google – have more access to resources and personnel than you can ever dream of. For infrastructure security, they’re the best. So why are so many companies still concerned with moving their data to the cloud?

The Chicken & Egg Secret Protection Problem in Micro-services

Alice keeps all her passwords in an Excel file on her desktop. However, she was told it is a very bad practice, since Eve can easily get access to the computer, read the file,and access Alice passwords and accounts. To enhance her security, Alice got a password protection software, KeePass, and she now saves all her passwords safely there – except for her KeePass password, which Alice keeps in an Excel file on her desktop. ‍Good news for Eve...

Technado, Episode 128: CyberArmor's Shauli Rozen

With the short week for the Thanksgiving holiday in the US, the Technado team decided to have a little fun by looking back at some of the dumbest tech headlines from 2019. Romanian witches online, flat-earthers, and fake food for virtual dogs - what a time to be alive. Then, Shauli Rozen joined all the way from Israel to talk about a zero-trust environment in DevOps. IT skills & certification training that’s effective & engaging. Binge-worthy learning for IT teams & individuals with 4000+ hours of on-demand video courses led by top-rated trainers. New content added daily.