Cloud Security

Shai-Hulud 2.0: How Cortex Helps Protect Against the Resurgent npm Worm

Shai-Hulud 2.0: How Cortex Helps Protect Against the Resurgent npm Worm

Shai-Hulud 2.0 exposes the fragility of software supply chains. Learn how the npm worm spreads through developer ecosyst...
Nov 26, 2025
Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossible

Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossibl...

Kubernetes identity security demands clarity. Learn how KIEMPossible uncovers entities, permissions and usage to help you reduce identity attack surfa...
Nov 25, 2025
Is Your Snowflake Data at Risk? Find and Protect Sensitive Data with DSPM

Is Your Snowflake Data at Risk? Find and Protect Sensitive Data with DSPM

Cloud data security is critical. Learn how Snowflake users can mitigate risks with effective data security posture management (DSPM) and enhanced secu...
Nov 21, 2025
Explore the OWASP Top 10 for LLMs: A New Interactive Guide

Explore the OWASP Top 10 for LLMs: A New Interactive Guide

AI security starts with the OWASP Top 10 for LLMs. Explore our interactive guide to uncover and mitigate the biggest risks across your AI pipelines.
Nov 20, 2025

Subscribe to Cloud Security Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.