Spectral now part of Check Point’s CloudGuard to provide the industry’s most comprehensive security platform from code to cloud Read now

Back to blog

Eyal Katz

What does IAM PassRole do and How to Set it Up

What does IAM PassRole do and How to Set it Up

95% of cloud security fails are due to internal slip-ups. One wrong password, one sloppy permission, and your sensitive data are out in the open. Thankfully,

What is the Dirty COW exploit, and how to prevent it

What is the Dirty COW exploit, and how to prevent it

Dirty COW, a seemingly light-hearted name, masks a severe Linux privilege escalation issue. This bug has affected many older Linux systems, which is concerning given that

5 Steps to Building a Robust Cyber Resilience Framework

5 Steps to Building a Robust Cyber Resilience Framework

The reality of cybersecurity is simple – breaches will occur – and reactivity will always be the losing strategy. Having a cyber resilience framework shifts the

top 10 linux vulnerability scanners

Top 10 Linux Vulnerability Scanners for 2024

As you step into 2024, do you have absolute confidence in the security of your Linux systems? The stakes have never been higher, and the risk

7 Smart Steps to Run Serverless Containers on Kubernetes

7 Smart Steps to Run Serverless Containers on Kubernetes

Serverless containers mark a notable evolution from traditional containerization. Traditional containers, being continuously active, can lead to resource wastage. Serverless containers, however, are ephemeral and operate

The Essential Guide to Data Monitoring

The Essential Guide to Data Monitoring

In a world where data is the new currency, understanding and leveraging data monitoring has become indispensable. Data monitoring involves systematically collecting, analyzing, and managing data

What is the DevSecOps Maturity Model (DSOMM)?

What is the DevSecOps Maturity Model (DSOMM)?

High-velocity software development today is close to impossible (and most certainly not sustainable) without DevOps. The migration to the public cloud, along with increasing regulatory demands,

7 DevSecOps Principals Every Developer Must Know

7 DevSecOps Principals Every Developer Must Know

DevSecOps – for many, it feels like a magical black box where code and sensitive digital assets go in one end, and a working piece of

6 Essentials for a Near Perfect Cyber Threat Intelligence Framework

6 Essentials for a Near Perfect Cyber Threat Intelligence Framework

Software developers face a constant barrage of cyber threats that can compromise their applications, data, and the security of their organizations. In 2023, the cyber threat

Stop leaks at the source!