Dr. Swarup Kumar SahooinDeepfence Cloud Native SecurityDetecting Secrets to reduce Attack SurfaceIn last few articles, we had focused on vulnerability scanning of hosts and containers in AWS ECS, Azure AKS, Google GKE and Oracle OKE…Feb 4, 2021Feb 4, 2021
Dr. Swarup Kumar SahooinDeepfence Cloud Native SecurityRuntime Threat Mapping for Fargate Serverless Deployments Using Deepfence ThreatMapperYou can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container…Jan 14, 2021Jan 14, 2021
Dr. Swarup Kumar SahooinDeepfence Cloud Native SecurityObservability and Security of Fargate Serverless DeploymentsLearn about 7 challenges businesses face when monitoring and securing AWS Fargate, and how Deepfence can helpJan 8, 2021Jan 8, 2021
Dr. Swarup Kumar SahooinDeepfence Cloud Native SecurityUse case — Runtime Threat Mapping for Bottlerocket containers using Deepfence ThreatMapperYou can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container…Sep 28, 2020Sep 28, 2020
Dr. Swarup Kumar SahooinDeepfence Cloud Native SecurityComprehensive Security for Multi-Cloud WorkloadsAs enterprises adopt to micro-services and cloud based architecture, they are slowly moving from a single cloud deployment to a…Aug 8, 2020Aug 8, 2020
Dr. Swarup Kumar SahooinDeepfence Cloud Native SecurityExploitability Vs Vulnerability — Leveraging Exploitability for Vulnerability ManagementCloud native apps are complex & can be hard to secure. See how to prioritize & visualize your most exploitable vulnerabilities w/…Jun 16, 2020Jun 16, 2020