DEV Community

CloudDefense.AI profile picture

CloudDefense.AI

CloudDefense.AI is an industry-leading CNAPP platform that provides instant, 360 degree visibility and risk reduction for your Cloud and Applications.

Location Palo Alto, CA 94301 Joined Joined on  Personal website https://www.clouddefense.ai/ twitter website
Top 5 Application Security Best Practices

Top 5 Application Security Best Practices

Comments
2 min read

Want to connect with CloudDefense.AI?

Create an account to connect with CloudDefense.AI. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
What Is a Supply Chain Attack?

What Is a Supply Chain Attack?

Comments
3 min read
Most Common Types of Ransomware

Most Common Types of Ransomware

Comments
2 min read
8 Common Cloud Vulnerabilities

8 Common Cloud Vulnerabilities

Comments
2 min read
Malware Detection: Techniques and Technologies

Malware Detection: Techniques and Technologies

Comments
3 min read
Escaping the Vulnerability Vortex: Securing Code for a Safer Tomorrow

Escaping the Vulnerability Vortex: Securing Code for a Safer Tomorrow

Comments
2 min read
Black Hat USA 2024: 5 Key Takeaways

Black Hat USA 2024: 5 Key Takeaways

Comments
2 min read
What is a Threat Intelligence Platform (TIP)?

What is a Threat Intelligence Platform (TIP)?

Comments
2 min read
OpenSSL Vulnerability: What Do You Need to Know?

OpenSSL Vulnerability: What Do You Need to Know?

Comments
3 min read
What is Web Filtering?

What is Web Filtering?

Comments
1 min read
What is a Botnet? Understanding the Malicious Network Threat

What is a Botnet? Understanding the Malicious Network Threat

Comments
2 min read
What is Cloud Workload Protection?

What is Cloud Workload Protection?

Comments
2 min read
What is a Kubernetes Cluster?

What is a Kubernetes Cluster?

Comments
3 min read
What is URL Phishing and How to Prevent it?

What is URL Phishing and How to Prevent it?

Comments
2 min read
How Can You Evolve CSPM Strategies to Meet Dynamic Compliance Demands?

How Can You Evolve CSPM Strategies to Meet Dynamic Compliance Demands?

Comments
2 min read
How to Choose the Best CSPM Tool?

How to Choose the Best CSPM Tool?

Comments
2 min read
What is SaaS (Software as a Service)?

What is SaaS (Software as a Service)?

Comments
2 min read
Deep Web vs Dark Web: What’s the Difference?

Deep Web vs Dark Web: What’s the Difference?

Comments
2 min read
Understanding the DevSecOps LifeCycle

Understanding the DevSecOps LifeCycle

Comments
2 min read
EPP vs EDR: What is the Difference?

EPP vs EDR: What is the Difference?

Comments
3 min read
What is Shift Left Security & Testing?

What is Shift Left Security & Testing?

Comments
3 min read
What Is Data Classification? – Definition, Types & Examples

What Is Data Classification? – Definition, Types & Examples

Comments
2 min read
What are the 5 Pillars of Cyber Security?

What are the 5 Pillars of Cyber Security?

Comments
3 min read
MITRE ATT&CK vs. NIST CSF: A Comprehensive Guide to Cybersecurity Frameworks

MITRE ATT&CK vs. NIST CSF: A Comprehensive Guide to Cybersecurity Frameworks

Comments
4 min read
Can End-To-End Encryption be Hacked? – Details Explained

Can End-To-End Encryption be Hacked? – Details Explained

1
Comments
3 min read
10 Billion Passwords Leaked to Crime Forum by Hackers

10 Billion Passwords Leaked to Crime Forum by Hackers

Comments
2 min read
Cloud Risk Management Best Practices

Cloud Risk Management Best Practices

1
Comments
2 min read
10 Tips for Building a Cyber Resilience Strategy

10 Tips for Building a Cyber Resilience Strategy

Comments
3 min read
TeamViewer Admits Corporate Breach, Security Researchers Warn of Potential Customer Risk

TeamViewer Admits Corporate Breach, Security Researchers Warn of Potential Customer Risk

Comments
2 min read
Major Identity Verification Firm AU10TIX Exposes User Data in Year-Long Security Lapse

Major Identity Verification Firm AU10TIX Exposes User Data in Year-Long Security Lapse

4
Comments 1
2 min read
Top 10 Kubernetes Security Best Practices

Top 10 Kubernetes Security Best Practices

1
Comments
3 min read
What is Reconnaissance in Cyber Security?

What is Reconnaissance in Cyber Security?

Comments
2 min read
What is a Container Registry? – Types and Benefits

What is a Container Registry? – Types and Benefits

Comments
3 min read
What is an Attack Surface Management?

What is an Attack Surface Management?

Comments
3 min read
How to Secure the 5 Cloud Environments?

How to Secure the 5 Cloud Environments?

Comments
2 min read
What is Threat Detection and Response (TDR)?

What is Threat Detection and Response (TDR)?

Comments
3 min read
What is Dynamic Code Analysis?

What is Dynamic Code Analysis?

Comments
2 min read
What is Remote Code Execution (RCE)?

What is Remote Code Execution (RCE)?

Comments
2 min read
What Is Vulnerability Remediation?

What Is Vulnerability Remediation?

Comments
2 min read
What Is Spyware? Definition, Types, And Protection

What Is Spyware? Definition, Types, And Protection

Comments
2 min read
What Is a Computer Worm (Worm Virus)?

What Is a Computer Worm (Worm Virus)?

Comments
2 min read
Intrusion Detection System (IDS) Vs Intrusion Prevention System (IPS)

Intrusion Detection System (IDS) Vs Intrusion Prevention System (IPS)

Comments
2 min read
What Is Cross-Site Scripting (XSS) and How Does It Work?

What Is Cross-Site Scripting (XSS) and How Does It Work?

Comments
1 min read
What is Cyber Threat Intelligence?

What is Cyber Threat Intelligence?

Comments
3 min read
What is a Data Center?

What is a Data Center?

Comments
2 min read
Risk vs Threat vs Vulnerability: What’s the Difference?

Risk vs Threat vs Vulnerability: What’s the Difference?

Comments
2 min read
What is Container Scanning?

What is Container Scanning?

Comments
2 min read
What Is Advanced Threat Protection (ATP)?

What Is Advanced Threat Protection (ATP)?

Comments
2 min read
Top Cloud Security Risks, Threats and Challenges

Top Cloud Security Risks, Threats and Challenges

1
Comments
3 min read
What is Endpoint Protection? How Does It Work?

What is Endpoint Protection? How Does It Work?

Comments
2 min read
What is Spear Phishing?

What is Spear Phishing?

Comments
2 min read
What is Hacktivism? How It Works, Types & Examples

What is Hacktivism? How It Works, Types & Examples

Comments
1 min read
Security Operations Center (SOC) Roles and Responsibilities

Security Operations Center (SOC) Roles and Responsibilities

Comments
2 min read
Kubernetes Security Posture Management (KSPM) – Explained!

Kubernetes Security Posture Management (KSPM) – Explained!

Comments
2 min read
What is Attack Path Analysis

What is Attack Path Analysis

Comments
2 min read
What is an API Call and How Does it Work?

What is an API Call and How Does it Work?

Comments
2 min read
What Is A Cloud Access Security Broker (CASB)?

What Is A Cloud Access Security Broker (CASB)?

Comments
2 min read
EDR vs MDR vs XDR: Key Difference

EDR vs MDR vs XDR: Key Difference

Comments
2 min read
What is a Distributed Denial-of-Service (DDoS) attack?

What is a Distributed Denial-of-Service (DDoS) attack?

Comments
2 min read
Shared Responsibility Model – Explained!

Shared Responsibility Model – Explained!

Comments
2 min read
loading...