DEV Community

CloudDefense.AI profile picture

CloudDefense.AI

CloudDefense.AI is an industry-leading CNAPP platform that provides instant, 360 degree visibility and risk reduction for your Cloud and Applications.

Location Palo Alto, CA 94301 Joined Joined on  Personal website https://www.clouddefense.ai/ twitter website
What is Security as Code (SaC)?

What is Security as Code (SaC)?

Comments
2 min read

Want to connect with CloudDefense.AI?

Create an account to connect with CloudDefense.AI. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
What is Secure SD-Branch?

What is Secure SD-Branch?

Comments
2 min read
What is Point of Sale Security?

What is Point of Sale Security?

Comments
2 min read
What is the Security Operation Center (SOC) Framework?

What is the Security Operation Center (SOC) Framework?

1
Comments
2 min read
What Is Containerization in Cyber Security?

What Is Containerization in Cyber Security?

Comments
2 min read
What is a Remote Access VPN?

What is a Remote Access VPN?

Comments
2 min read
What is SOAR?

What is SOAR?

Comments
2 min read
What is Secure Service Edge (SSE)?

What is Secure Service Edge (SSE)?

Comments
2 min read
What is Firewall as a Service (FWaaS)?

What is Firewall as a Service (FWaaS)?

Comments
2 min read
What is Encryption-as-a-Service?

What is Encryption-as-a-Service?

Comments
2 min read
What is Threat Detection and Incident Response (TDIR)?

What is Threat Detection and Incident Response (TDIR)?

Comments
2 min read
What is a Domain Name System (DNS)?

What is a Domain Name System (DNS)?

1
Comments
2 min read
What is SaaS Security?

What is SaaS Security?

Comments
2 min read
What is a Software-defined Perimeter?

What is a Software-defined Perimeter?

Comments
2 min read
What is Election Security?

What is Election Security?

Comments
4 min read
What is SASE?

What is SASE?

Comments
4 min read
What is the OSI Model?

What is the OSI Model?

Comments
4 min read
What is URL Filtering?

What is URL Filtering?

Comments
5 min read
What is a Secure Web Gateway (SWG)?

What is a Secure Web Gateway (SWG)?

Comments
5 min read
What is Network Security Management?

What is Network Security Management?

Comments
4 min read
What is a Network Firewall?

What is a Network Firewall?

Comments
4 min read
The Difference Between Risk Assessment and Risk Mitigation

The Difference Between Risk Assessment and Risk Mitigation

Comments
3 min read
Multi Cloud vs. Hybrid-Cloud: What Are the Key Differences?

Multi Cloud vs. Hybrid-Cloud: What Are the Key Differences?

Comments
5 min read
Network Security Vs Application Security: Key Differences

Network Security Vs Application Security: Key Differences

Comments
4 min read
What is Web Security?

What is Web Security?

Comments
4 min read
Malware vs. Ransomware: Key Differences, Risks, and Prevention Strategies

Malware vs. Ransomware: Key Differences, Risks, and Prevention Strategies

Comments
4 min read
Zero Trust Vs Principle of Least Privilege (PoLP)

Zero Trust Vs Principle of Least Privilege (PoLP)

Comments
5 min read
Cloud Security vs Traditional Security: Key Differences

Cloud Security vs Traditional Security: Key Differences

Comments
4 min read
What is a Smurf Attack?

What is a Smurf Attack?

2
Comments
4 min read
Serverless Vs Containers: Key Differences

Serverless Vs Containers: Key Differences

Comments
5 min read
What is Internet Fraud?

What is Internet Fraud?

Comments
3 min read
What is a Backdoor Attack?

What is a Backdoor Attack?

Comments
3 min read
What is Extended Detection and Response (XDR)?

What is Extended Detection and Response (XDR)?

Comments
3 min read
What is Firmware Security?

What is Firmware Security?

Comments
3 min read
What is Internet Security?

What is Internet Security?

Comments
3 min read
What is Private Cloud Security?

What is Private Cloud Security?

Comments
4 min read
What Is Privileged Access Management (PAM)?

What Is Privileged Access Management (PAM)?

Comments
3 min read
What is Network Access Control(NAC)?

What is Network Access Control(NAC)?

Comments
3 min read
Top 5 Common Mistakes in Cloud Data Security and How to Avoid Them

Top 5 Common Mistakes in Cloud Data Security and How to Avoid Them

1
Comments
2 min read
What is Healthcare Data Security?

What is Healthcare Data Security?

Comments
3 min read
What Is a Web Application Firewall

What Is a Web Application Firewall

Comments
3 min read
What Is Malicious Code?

What Is Malicious Code?

Comments
3 min read
What is Cloud DLP (Data Loss Prevention)?

What is Cloud DLP (Data Loss Prevention)?

Comments
3 min read
What is Code Scanning?

What is Code Scanning?

Comments
3 min read
What is a Perimeter Firewall?

What is a Perimeter Firewall?

Comments
3 min read
Top 5 Cyberattacks of 2024

Top 5 Cyberattacks of 2024

Comments
3 min read
What is File Security?

What is File Security?

Comments
3 min read
What is Embedded Security?

What is Embedded Security?

Comments
3 min read
NOC vs SOC – What’s the Difference?

NOC vs SOC – What’s the Difference?

Comments
3 min read
What Is Zero Trust Architecture – The Complete Guide

What Is Zero Trust Architecture – The Complete Guide

Comments
3 min read
Top 10 Cloud Security Industry Certifications

Top 10 Cloud Security Industry Certifications

Comments
4 min read
What is a Common Vulnerability Scoring System (CVSS)?

What is a Common Vulnerability Scoring System (CVSS)?

Comments
4 min read
Cloud Cost Optimization: 15 Best Practices to Reduce Cloud Cost

Cloud Cost Optimization: 15 Best Practices to Reduce Cloud Cost

Comments
3 min read
What is Cloud Compliance?

What is Cloud Compliance?

Comments
3 min read
What is Network Security?

What is Network Security?

Comments
3 min read
Top 16 Enterprise Cybersecurity Challenges in 2024

Top 16 Enterprise Cybersecurity Challenges in 2024

Comments
4 min read
What is Kubernetes Runtime Security?

What is Kubernetes Runtime Security?

Comments
3 min read
What is Cloud Firewall?

What is Cloud Firewall?

Comments
2 min read
Palo Alto Firewalls Hacked: The Risks of Ignoring Zero-Day Vulnerabilities in Cloud Security

Palo Alto Firewalls Hacked: The Risks of Ignoring Zero-Day Vulnerabilities in Cloud Security

Comments
2 min read
Top 14 API Security Best Practices

Top 14 API Security Best Practices

Comments
3 min read
loading...