Homepage
Open in app
Sign in
Get started
Runtime Security for K8s, Virtual Machines & Serverless
Follow
Detecting Secrets to reduce Attack Surface
Detecting Secrets to reduce Attack Surface
In last few articles, we had focused on vulnerability scanning of hosts and containers in AWS ECS, Azure AKS, Google GKE and Oracle OKE…
Dr. Swarup Kumar Sahoo
Feb 4
Runtime Threat Mapping for Fargate Serverless Deployments Using Deepfence ThreatMapper
Runtime Threat Mapping for Fargate Serverless Deployments Using Deepfence ThreatMapper
You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container…
Dr. Swarup Kumar Sahoo
Jan 14
Observability and Security of Fargate Serverless Deployments
Observability and Security of Fargate Serverless Deployments
Serverless computing models like fargate are in widespread use now-a-days due to their various advantages like scalability, productivity…
Dr. Swarup Kumar Sahoo
Jan 8
Milestone: Announcing our 9.5M series A!
Milestone: Announcing our 9.5M series A!
I’m super excited to announce that we have raised $9.5M Series A, led by cyber security powerhouse Allegis Cyber. Sonae IM, a cyber &…
Sandeep Lahane
Nov 18, 2020
Use case — Runtime Threat Mapping for Bottlerocket containers using Deepfence ThreatMapper
Use case — Runtime Threat Mapping for Bottlerocket containers using Deepfence ThreatMapper
You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container…
Dr. Swarup Kumar Sahoo
Sep 28, 2020
Comprehensive Security for Multi-Cloud Workloads
Comprehensive Security for Multi-Cloud Workloads
As enterprises adopt to micro-services and cloud based architecture, they are slowly moving from a single cloud deployment to a…
Dr. Swarup Kumar Sahoo
Aug 8, 2020
Threat Mapping for Windows Containers
Threat Mapping for Windows Containers
In the last few posts, we described how to install the Deepfence community edition i.e., ThreatMapper, and use it for run-time threat…
Shyam Krishnaswamy
Jul 23, 2020
Use case — Runtime Threat Mapping for GKE using Deepfence ThreatMapper
Use case — Runtime Threat Mapping for GKE using Deepfence ThreatMapper
You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container…
Ramanan
Jul 16, 2020
Use case — Runtime Threat Mapping for AKS using Deepfence ThreatMapper
Use case — Runtime Threat Mapping for AKS using Deepfence ThreatMapper
Last month we had described how to install Deepfence community edition i.e., ThreatMapper on AWS ECS, and use it for vulnerability…
Shyam Krishnaswamy
Jul 6, 2020
Exploitability Vs Vulnerability — Leveraging Exploitability for Vulnerability Management
Exploitability Vs Vulnerability — Leveraging Exploitability for Vulnerability Management
Modern Cloud-native applications are complex and have a lot of dependencies on external libraries including open-source components with…
Dr. Swarup Kumar Sahoo
Jun 16, 2020
About Deepfence Cloud Native Security
Latest Stories
Archive
About Medium
Terms
Privacy