DEV Community

CloudDefense.AI profile picture

CloudDefense.AI

CloudDefense.AI is an industry-leading CNAPP platform that provides instant, 360 degree visibility and risk reduction for your Cloud and Applications.

Location Palo Alto, CA 94301 Joined Joined on  Personal website https://www.clouddefense.ai/ twitter website
What Is Zero Trust Architecture – The Complete Guide

What Is Zero Trust Architecture – The Complete Guide

Comments
3 min read

Want to connect with CloudDefense.AI?

Create an account to connect with CloudDefense.AI. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Top 10 Cloud Security Industry Certifications

Top 10 Cloud Security Industry Certifications

Comments
4 min read
What is a Common Vulnerability Scoring System (CVSS)?

What is a Common Vulnerability Scoring System (CVSS)?

Comments
4 min read
Cloud Cost Optimization: 15 Best Practices to Reduce Cloud Cost

Cloud Cost Optimization: 15 Best Practices to Reduce Cloud Cost

Comments
3 min read
What is Cloud Compliance?

What is Cloud Compliance?

Comments
3 min read
What is Network Security?

What is Network Security?

Comments
3 min read
Top 16 Enterprise Cybersecurity Challenges in 2024

Top 16 Enterprise Cybersecurity Challenges in 2024

Comments
4 min read
What is Kubernetes Runtime Security?

What is Kubernetes Runtime Security?

Comments
3 min read
What is Cloud Firewall?

What is Cloud Firewall?

Comments
2 min read
Palo Alto Firewalls Hacked: The Risks of Ignoring Zero-Day Vulnerabilities in Cloud Security

Palo Alto Firewalls Hacked: The Risks of Ignoring Zero-Day Vulnerabilities in Cloud Security

Comments
2 min read
Top 14 API Security Best Practices

Top 14 API Security Best Practices

Comments
3 min read
Top 5 Application Security Best Practices

Top 5 Application Security Best Practices

Comments
2 min read
What Is a Supply Chain Attack?

What Is a Supply Chain Attack?

Comments
3 min read
Most Common Types of Ransomware

Most Common Types of Ransomware

Comments
2 min read
8 Common Cloud Vulnerabilities

8 Common Cloud Vulnerabilities

Comments
2 min read
Malware Detection: Techniques and Technologies

Malware Detection: Techniques and Technologies

Comments
3 min read
Escaping the Vulnerability Vortex: Securing Code for a Safer Tomorrow

Escaping the Vulnerability Vortex: Securing Code for a Safer Tomorrow

Comments
2 min read
Black Hat USA 2024: 5 Key Takeaways

Black Hat USA 2024: 5 Key Takeaways

Comments
2 min read
What is a Threat Intelligence Platform (TIP)?

What is a Threat Intelligence Platform (TIP)?

Comments
2 min read
OpenSSL Vulnerability: What Do You Need to Know?

OpenSSL Vulnerability: What Do You Need to Know?

Comments
3 min read
What is Web Filtering?

What is Web Filtering?

Comments
1 min read
What is a Botnet? Understanding the Malicious Network Threat

What is a Botnet? Understanding the Malicious Network Threat

Comments
2 min read
What is Cloud Workload Protection?

What is Cloud Workload Protection?

Comments
2 min read
What is a Kubernetes Cluster?

What is a Kubernetes Cluster?

Comments
3 min read
What is URL Phishing and How to Prevent it?

What is URL Phishing and How to Prevent it?

Comments
2 min read
How Can You Evolve CSPM Strategies to Meet Dynamic Compliance Demands?

How Can You Evolve CSPM Strategies to Meet Dynamic Compliance Demands?

Comments
2 min read
How to Choose the Best CSPM Tool?

How to Choose the Best CSPM Tool?

Comments
2 min read
What is SaaS (Software as a Service)?

What is SaaS (Software as a Service)?

Comments
2 min read
Deep Web vs Dark Web: What’s the Difference?

Deep Web vs Dark Web: What’s the Difference?

Comments
2 min read
Understanding the DevSecOps LifeCycle

Understanding the DevSecOps LifeCycle

Comments
2 min read
EPP vs EDR: What is the Difference?

EPP vs EDR: What is the Difference?

Comments
3 min read
What is Shift Left Security & Testing?

What is Shift Left Security & Testing?

Comments
3 min read
What Is Data Classification? – Definition, Types & Examples

What Is Data Classification? – Definition, Types & Examples

Comments
2 min read
What are the 5 Pillars of Cyber Security?

What are the 5 Pillars of Cyber Security?

Comments
3 min read
MITRE ATT&CK vs. NIST CSF: A Comprehensive Guide to Cybersecurity Frameworks

MITRE ATT&CK vs. NIST CSF: A Comprehensive Guide to Cybersecurity Frameworks

1
Comments
4 min read
Can End-To-End Encryption be Hacked? – Details Explained

Can End-To-End Encryption be Hacked? – Details Explained

1
Comments
3 min read
10 Billion Passwords Leaked to Crime Forum by Hackers

10 Billion Passwords Leaked to Crime Forum by Hackers

Comments
2 min read
Cloud Risk Management Best Practices

Cloud Risk Management Best Practices

1
Comments
2 min read
10 Tips for Building a Cyber Resilience Strategy

10 Tips for Building a Cyber Resilience Strategy

Comments
3 min read
TeamViewer Admits Corporate Breach, Security Researchers Warn of Potential Customer Risk

TeamViewer Admits Corporate Breach, Security Researchers Warn of Potential Customer Risk

Comments
2 min read
Major Identity Verification Firm AU10TIX Exposes User Data in Year-Long Security Lapse

Major Identity Verification Firm AU10TIX Exposes User Data in Year-Long Security Lapse

4
Comments 1
2 min read
Top 10 Kubernetes Security Best Practices

Top 10 Kubernetes Security Best Practices

1
Comments
3 min read
What is Reconnaissance in Cyber Security?

What is Reconnaissance in Cyber Security?

Comments
2 min read
What is a Container Registry? – Types and Benefits

What is a Container Registry? – Types and Benefits

Comments
3 min read
What is an Attack Surface Management?

What is an Attack Surface Management?

Comments
3 min read
How to Secure the 5 Cloud Environments?

How to Secure the 5 Cloud Environments?

Comments
2 min read
What is Threat Detection and Response (TDR)?

What is Threat Detection and Response (TDR)?

Comments
3 min read
What is Dynamic Code Analysis?

What is Dynamic Code Analysis?

Comments
2 min read
What is Remote Code Execution (RCE)?

What is Remote Code Execution (RCE)?

Comments
2 min read
What Is Vulnerability Remediation?

What Is Vulnerability Remediation?

Comments
2 min read
What Is Spyware? Definition, Types, And Protection

What Is Spyware? Definition, Types, And Protection

Comments
2 min read
What Is a Computer Worm (Worm Virus)?

What Is a Computer Worm (Worm Virus)?

Comments
2 min read
Intrusion Detection System (IDS) Vs Intrusion Prevention System (IPS)

Intrusion Detection System (IDS) Vs Intrusion Prevention System (IPS)

Comments
2 min read
What Is Cross-Site Scripting (XSS) and How Does It Work?

What Is Cross-Site Scripting (XSS) and How Does It Work?

Comments
1 min read
What is Cyber Threat Intelligence?

What is Cyber Threat Intelligence?

Comments
3 min read
What is a Data Center?

What is a Data Center?

Comments
2 min read
Risk vs Threat vs Vulnerability: What’s the Difference?

Risk vs Threat vs Vulnerability: What’s the Difference?

Comments
2 min read
What is Container Scanning?

What is Container Scanning?

Comments
2 min read
What Is Advanced Threat Protection (ATP)?

What Is Advanced Threat Protection (ATP)?

Comments
2 min read
Top Cloud Security Risks, Threats and Challenges

Top Cloud Security Risks, Threats and Challenges

1
Comments
3 min read
loading...