DEV Community

CloudDefense.AI profile picture

CloudDefense.AI

CloudDefense.AI is an industry-leading CNAPP platform that provides instant, 360 degree visibility and risk reduction for your Cloud and Applications.

Location Palo Alto, CA 94301 Joined Joined on  Personal website https://www.clouddefense.ai/ twitter website
What Is Advanced Threat Protection (ATP)?

What Is Advanced Threat Protection (ATP)?

Comments
2 min read

Want to connect with CloudDefense.AI?

Create an account to connect with CloudDefense.AI. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Top Cloud Security Risks, Threats and Challenges

Top Cloud Security Risks, Threats and Challenges

Comments
3 min read
What is Endpoint Protection? How Does It Work?

What is Endpoint Protection? How Does It Work?

Comments
2 min read
What is Spear Phishing?

What is Spear Phishing?

Comments
2 min read
What is Hacktivism? How It Works, Types & Examples

What is Hacktivism? How It Works, Types & Examples

Comments
1 min read
Security Operations Center (SOC) Roles and Responsibilities

Security Operations Center (SOC) Roles and Responsibilities

Comments
2 min read
Kubernetes Security Posture Management (KSPM) – Explained!

Kubernetes Security Posture Management (KSPM) – Explained!

Comments
2 min read
What is Attack Path Analysis

What is Attack Path Analysis

Comments
2 min read
What is an API Call and How Does it Work?

What is an API Call and How Does it Work?

Comments
2 min read
What Is A Cloud Access Security Broker (CASB)?

What Is A Cloud Access Security Broker (CASB)?

Comments
2 min read
EDR vs MDR vs XDR: Key Difference

EDR vs MDR vs XDR: Key Difference

Comments
2 min read
What is a Distributed Denial-of-Service (DDoS) attack?

What is a Distributed Denial-of-Service (DDoS) attack?

Comments
2 min read
Shared Responsibility Model – Explained!

Shared Responsibility Model – Explained!

Comments
2 min read
What Is a Denial-of-Service (DoS) Attack?

What Is a Denial-of-Service (DoS) Attack?

Comments
2 min read
What is Managed Detection and Response (MDR)?

What is Managed Detection and Response (MDR)?

Comments
2 min read
Ransomware Attack – What is it and How Does it Work?

Ransomware Attack – What is it and How Does it Work?

Comments
2 min read
What is a Cyberattack? A Complete Guide

What is a Cyberattack? A Complete Guide

Comments
2 min read
What is a Security Operations Center (SOC)?

What is a Security Operations Center (SOC)?

Comments
2 min read
What Is a Next-Generation Firewall (NGFW)?

What Is a Next-Generation Firewall (NGFW)?

Comments
2 min read
Shared Responsibility Model - Explained!

Shared Responsibility Model - Explained!

Comments
2 min read
What is CI/CD Security?

What is CI/CD Security?

Comments
2 min read
What is SOC 2 Compliance? Definition, Principles, Types & More

What is SOC 2 Compliance? Definition, Principles, Types & More

Comments
2 min read
What is Cloud Workload? Types, Challenges & Best Practices

What is Cloud Workload? Types, Challenges & Best Practices

Comments
2 min read
What is Vulnerability Management?

What is Vulnerability Management?

Comments
2 min read
9 Cloud Security Challenges Every Organization Encounters

9 Cloud Security Challenges Every Organization Encounters

Comments
3 min read
What is DSPM? Data Security Posture Management Explained

What is DSPM? Data Security Posture Management Explained

Comments
2 min read
Best Vulnerability Management Tools for 2024

Best Vulnerability Management Tools for 2024

Comments
2 min read
What is Cloud Security Monitoring?

What is Cloud Security Monitoring?

Comments
2 min read
Understanding CWPP vs CSPM vs CNAPP vs CIEM: What’s the Difference?

Understanding CWPP vs CSPM vs CNAPP vs CIEM: What’s the Difference?

Comments
2 min read
Top 13 Cloud Security Best Practices

Top 13 Cloud Security Best Practices

Comments
2 min read
5G’s Influence on Cloud Computing

5G’s Influence on Cloud Computing

Comments
2 min read
Serverless Architecture: What It Is & How It Works

Serverless Architecture: What It Is & How It Works

Comments
2 min read
Understanding DevSecOps and Its Role in CI/CD

Understanding DevSecOps and Its Role in CI/CD

Comments
2 min read
Indian State Government Fixes Website Bugs Found by CloudDefense.AI

Indian State Government Fixes Website Bugs Found by CloudDefense.AI

Comments
2 min read
AWSZeroTrustPolicy – A Guide to Zero Trust Policy Implementation on AWS

AWSZeroTrustPolicy – A Guide to Zero Trust Policy Implementation on AWS

Comments
2 min read
Snowflake Security Best Practices: A Comprehensive Guide to Safeguarding Your Data

Snowflake Security Best Practices: A Comprehensive Guide to Safeguarding Your Data

Comments
2 min read
How Do You Detect and Prevent Suspicious Network Activity?

How Do You Detect and Prevent Suspicious Network Activity?

Comments
2 min read
What is SAST (Static Application Security Testing)?

What is SAST (Static Application Security Testing)?

Comments
3 min read
The Ultimate Guide to Software Bill of Materials (SBOM) with GitLab Actions

The Ultimate Guide to Software Bill of Materials (SBOM) with GitLab Actions

Comments
2 min read
What you must know about CIS Benchmarks for Google Cloud Platform

What you must know about CIS Benchmarks for Google Cloud Platform

Comments
2 min read
PCI Compliance Audit Checklist: 7 Simple Steps [+Tips]

PCI Compliance Audit Checklist: 7 Simple Steps [+Tips]

Comments
3 min read
5 Tips to Expedite the ISO Audit Process

5 Tips to Expedite the ISO Audit Process

Comments
3 min read
Comprehensive Cloud Protection: CloudDefense.AI Integrates with Amazon Inspector for Enhanced Security

Comprehensive Cloud Protection: CloudDefense.AI Integrates with Amazon Inspector for Enhanced Security

Comments
2 min read
Centralize Security Vulnerabilities with Amazon Macie Integration in CloudDefense.AI

Centralize Security Vulnerabilities with Amazon Macie Integration in CloudDefense.AI

Comments
2 min read
How to Generate SBOM with Azure DevOps Pipeline

How to Generate SBOM with Azure DevOps Pipeline

1
Comments
3 min read
Penetration Testing – Step-By-Step Guide

Penetration Testing – Step-By-Step Guide

Comments
2 min read
HIPAA Compliance Checklist: Key to Expediting HIPAA

HIPAA Compliance Checklist: Key to Expediting HIPAA

Comments
2 min read
CloudDefense.AI Uncovers Internshala’s Security Breach Exposes Users’ Data

CloudDefense.AI Uncovers Internshala’s Security Breach Exposes Users’ Data

Comments
2 min read
CI/CD Best Practices

CI/CD Best Practices

Comments
2 min read
CCPA Compliance Checklist: Key to Expediting CCPA

CCPA Compliance Checklist: Key to Expediting CCPA

Comments
2 min read
What is Cloud Infrastructure Entitled Management (CIEM)?

What is Cloud Infrastructure Entitled Management (CIEM)?

Comments
3 min read
DevSecOps Best Practices

DevSecOps Best Practices

Comments
2 min read
4 Tips to Expedite the GDPR Audit Process

4 Tips to Expedite the GDPR Audit Process

Comments
2 min read
DevOps vs DevSecOps: The Key Differences

DevOps vs DevSecOps: The Key Differences

Comments
2 min read
What is Endpoint Detection and Response? – The Ultimate Guide

What is Endpoint Detection and Response? – The Ultimate Guide

Comments
2 min read
A Comprehensive Guide to Cloud Vulnerability Management

A Comprehensive Guide to Cloud Vulnerability Management

Comments
2 min read
How to Implement an Effective CI/CD Pipeline

How to Implement an Effective CI/CD Pipeline

Comments
3 min read
What is a Cloud Workload Protection Platform (CWPP)?

What is a Cloud Workload Protection Platform (CWPP)?

Comments
3 min read
Embracing the Benefits of Single Delivery Platform Cybersecurity

Embracing the Benefits of Single Delivery Platform Cybersecurity

Comments
2 min read
How to Recover and Prevent Ransomware Attacks: Step By Step

How to Recover and Prevent Ransomware Attacks: Step By Step

Comments
2 min read
loading...