Homepage
Open in app
Sign inGet started

Runtime Security for K8s, Virtual Machines & Serverless

Detecting Secrets to reduce Attack Surface

Detecting Secrets to reduce Attack Surface

In last few articles, we had focused on vulnerability scanning of hosts and containers in AWS ECS, Azure AKS, Google GKE and Oracle OKE…
Go to the profile of Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Feb 4
Runtime Threat Mapping for Fargate Serverless Deployments Using Deepfence ThreatMapper

Runtime Threat Mapping for Fargate Serverless Deployments Using Deepfence ThreatMapper

You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container…
Go to the profile of Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Jan 14
Observability and Security of Fargate Serverless Deployments

Observability and Security of Fargate Serverless Deployments

Serverless computing models like fargate are in widespread use now-a-days due to their various advantages like scalability, productivity…
Go to the profile of Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Jan 8
Milestone: Announcing our 9.5M series A!

Milestone: Announcing our 9.5M series A!

I’m super excited to announce that we have raised $9.5M Series A, led by cyber security powerhouse Allegis Cyber. Sonae IM, a cyber &…
Go to the profile of Sandeep Lahane
Sandeep Lahane
Nov 18, 2020
Use case — Runtime Threat Mapping for Bottlerocket containers using Deepfence ThreatMapper

Use case — Runtime Threat Mapping for Bottlerocket containers using Deepfence ThreatMapper

You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container…
Go to the profile of Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Sep 28, 2020
Comprehensive Security for Multi-Cloud Workloads

Comprehensive Security for Multi-Cloud Workloads

As enterprises adopt to micro-services and cloud based architecture, they are slowly moving from a single cloud deployment to a…
Go to the profile of Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Aug 8, 2020
Threat Mapping for Windows Containers

Threat Mapping for Windows Containers

In the last few posts, we described how to install the Deepfence community edition i.e., ThreatMapper, and use it for run-time threat…
Go to the profile of Shyam Krishnaswamy
Shyam Krishnaswamy
Jul 23, 2020
Use case — Runtime Threat Mapping for GKE using Deepfence ThreatMapper

Use case — Runtime Threat Mapping for GKE using Deepfence ThreatMapper

You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container…
Go to the profile of Ramanan
Ramanan
Jul 16, 2020
Use case — Runtime Threat Mapping for AKS using Deepfence ThreatMapper

Use case — Runtime Threat Mapping for AKS using Deepfence ThreatMapper

Last month we had described how to install Deepfence community edition i.e., ThreatMapper on AWS ECS, and use it for vulnerability…
Go to the profile of Shyam Krishnaswamy
Shyam Krishnaswamy
Jul 6, 2020
Exploitability Vs Vulnerability — Leveraging Exploitability for Vulnerability Management

Exploitability Vs Vulnerability — Leveraging Exploitability for Vulnerability Management

Modern Cloud-native applications are complex and have a lot of dependencies on external libraries including open-source components with…
Go to the profile of Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Jun 16, 2020
About Deepfence Cloud Native SecurityLatest StoriesArchiveAbout MediumTermsPrivacy