Spectral now part of Check Point’s CloudGuard to provide the industry’s most comprehensive security platform from code to cloud Read now

Back to blog

Eyal Katz

Top 10 CI/CD Security Tools

Top 10 CI/CD Security Tools

On the one hand, your sales department is pushing for new features at an alarming rate, forcing you into faster deployment processes. On the other hand,

What is the ‘Zenbleed’ Exploit and 7 Ways to Prevent it Now

What is the ‘Zenbleed’ Exploit and 7 Ways to Prevent it Now

In 2018, the discovery of the Meltdown and Spectre CPU vulnerabilities sent shockwaves through the tech industry. These hardware flaws allowed attackers to steal sensitive data

5 Types of Software Supply Chain Attacks Developers Should Know

5 Types of Software Supply Chain Attacks Developers Should Know

What do ambulances in the UK, the Norwegian government, and a major Russian bank have in common? They were all victims of successful supply chain attacks

Dockerfile WORKDIR: How to Get Started and Advanced Usage

Dockerfile WORKDIR: How to Get Started and Advanced Usage

Welcome to the world of Docker containers, where the power of isolation and portability meets streamlined application development. Whether you’re an experienced Docker user or just

A Step-by-step Guide to Using Vue Router 4

A Step-by-step Guide to Using Vue Router 4

Vue has emerged as a ‘new kid in the block’ among JavaScript frameworks for building Single Page Applications (SPA) for the web. Originally inspired by Angular,

kubectl pod restart

Kubectl restart pod: A Foolproof Guide to Pod restarts

Containerization is the most popular approach for all modern cloud deployment. This technology makes it possible to encapsulate application workloads as OS-agnostic containers. The result is

Cryptography and network security: The quick and short guide

Cryptography and network security: The quick and short guide

There is an old joke among cybersecurity professionals that the only way to truly secure your data is to keep it on a machine without connection

Top 10 Security Automation Tools

Top 10 Security Automation Tools

With the increasing threats of cyber attacks, safeguarding sensitive data and digital assets has become one of the key considerations of modern organizations. According to The

7 Crucial Security Metrics Every Engineer Must Know

7 Crucial Security Metrics Every Engineer Must Know

It can feel like so many stars must align to effectively implement and measure security metrics. For example, you need to understand how to adapt frameworks

Stop leaks at the source!