Back to blog

Eyal Katz

How to Select the Right Data Discovery Tool for Your Requirements

How to Select the Right Data Discovery Tool for Your Requirements

Sensitive data, like customer information and internal processes, often lurks hidden in employee devices or in unmanaged spreadsheets. This “shadow data” poses a security risk because

Blue Green Deployment vs Canary

Blue Green Deployment vs Canary

A buggy rollout or, even worse, a security breach can lead to user frustration, lost trust, and damaged reputation. To keep users happy and your brand

How to stay ahead of AWS Lambda costsĀ 

How to stay ahead of AWS Lambda costsĀ 

Severless is excellent, right? Faster development and less infrastructure hassle – but those AWS Lambda costs can sneak up on you. Over 70% of AWS customers

How to Use Git Secrets for Better Code Security

How to Use Git Secrets for Better Code Security

You know that sinking feeling after you hit “commit”? That moment when you suddenly wonder, “Wait, did I just accidentally expose an API key or hardcode

9 Benefits of Zero Trust Architecture

9 Benefits of Zero Trust Architecture

Your organization’s data and applications are scattered across multiple cloud platforms and on-premise systems. How do you guarantee security in this sprawling digital landscape?   Cloud sprawl

7 Steps to ensure compliance with the CJIS security policy

7 Steps to ensure compliance with the CJIS security policy

A high-profile case hangs in the balance. Suddenly, court systems are paralyzed. Evidence is locked away, replaced by a ransom demand.  Every law enforcement agency’s nightmare

What does IAM PassRole do and How to Set it Up

What does IAM PassRole do and How to Set it Up

95% of cloud security fails are due to internal slip-ups. One wrong password, one sloppy permission, and your sensitive data are out in the open. Thankfully,

What is SSPM and do you need it in your stack?

What is SSPM and do you need it in your stack?

SaaS adoption has skyrocketed, offering organizations undeniable advantages. But beneath the surface lurk overlooked configuration errors. Misconfigured SaaS settings create security gaps. Broad permissions, weak defaults,

What is the Dirty COW exploit, and how to prevent it

What is the Dirty COW exploit, and how to prevent it

Dirty COW, a seemingly light-hearted name, masks a severe Linux privilege escalation issue. This bug has affected many older Linux systems, which is concerning given that

Stop leaks at the source!