Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

The secret to your Artifactory: A Deep Dive into Critical Exposures

While Artifactory tokens aren't the most common leaked secrets, GitGuardian's research reveals their critical nature in corporate environments. Recent investigations across major industries show how these tokens frequently expose sensitive resources through build configurations and DevOps code.

Feature Announcement: Enhancing ARMO Platform's Threat Detection and Response

We are excited to announce the upcoming enhancement of ARMO Platform’s Threat Detection and Response feature, designed to provide more robust, real-time security protection for your cloud and Kubernetes environments. While the existing feature effectively detects anomalies, suspicious behavior, and active threats, we recognize the need for additional critical components: Policies, Response, and notifications.

Cassie Crossley on Cybersecurity Challenges in Modern Supply Chains

Supply Chain Security: A Complex Web of Risks and Responsibilities The supply chain for a single device involves thousands, potentially millions of people over time. It's far too large a topic to fully grasp everything. I talk daily with folks about hardware specifics, human rights management, materials, chemical makeups and more. It's much more than just the bits and bytes we normally see.

What Is Behavioral Cloud Application Detection and Response (CADR) and Why It's Essential for Cloud-Native Security?

In this blog post, we will introduce the concept of behavioral Cloud Application Detection & Response (CADR). In case this is the first time you have heard of CADR, we’ll start by explaining that concept and explain why it’s essential for protecting modern applications. Let’s go.

Top Kubernetes Security Tools in 2025

Kubernetes security is a critical part of the app lifecycle, through the build, deployment and runtime stages. Kubernetes runtime environments are dynamic and continuously changing. As clusters are replaced and permissions reassigned, security becomes an innate part of DevOps. It is important to ensure that malware and other malicious attacks do not access the cloud, as they might lead to system failures, servers going down, and more.

CloudCasa Feature Update December 2024

Ask Our Experts The holiday season is nearly upon us, and 2024 is rapidly drawing to a close. It’s been a very busy year for the CloudCasa team, but we’re pleased to be able to roll out one more feature update before 2025. The whole CloudCasa team would like to wish all of you Happy Holidays and a happy, healthy, and productive new year!

Best 12 Container Scanning Tools Every DevOps & Security Professionals Should Know in 2025

Kubernetes is a revolutionary technology for orchestrating containerized applications, enabling organizations to deploy and manage applications efficiently. Containers’ portability, scalability, and agility have transformed software development and deployment. However, these benefits come with significant security challenges, including risks associated with vulnerabilities in container images and potential misconfigurations.