Cloud Native Security

Zero Trust Security Model in Cloud Environments

The traditional network security model has long relied on a simple yet increasingly outdated concept — the secure perimeter. The secure perimeter approach assumes everything inside a network is inherently trustworthy and focuses security efforts on keeping threats outside a defined boundary. But widespread adoption of cloud computing, coupled with an evolving threat landscape, has exposed the limitations of perimeter-based security....

Sep 21, 2023
The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree
Learn how a novel attack vector in GitHub Actions allows attackers to distribute malware across repositories using a technique that exploits the actio...
Sep 14, 2023
OpenID Connect: Let’s Talk Security
OpenID Connect (OIDC) is a modern authentication and authorization protocol built on top of the 0Auth 2.0 framework. OIDC enables secure and standardized authentication in applications, particularly web and mobile applications.
Sep 12, 2023
GigaOm Names Prisma Cloud a CSPM Leader, Second Consecutive Year
Moving to the cloud comes with technical complexities — security being one. Addressing the misconfigurations and risks contributes to this complexity,...
Aug 31, 2023
Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows
In today’s post, we look at action pinning, one of the profound mitigations against supply chain attacks in the GitHub Actions ecosystem. It turns out, though, that action pinning...
Aug 30, 2023

Subscribe to Cloud Native Security Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.