Comparing Aikido and Snyk for SCA Scanning
A small step towards total market coverage
A small step towards total market coverage
A three part series detailing what data is helpful for operationalizing vulnerability management (1/3)
Technical Guides
A guide into understanding what reachability is
Walking through the process of fixing container vulnerabilities
And other realities from last week's fundraising
Everything security teams need to detect real time attacks against modern infrastructure (Part 3/3)
Exploring why many CNAPPs have a Kubernetes gap
TL;DR: Qualys research team discovered an issue where you can exploit OpenSSH with a “brute force” like timing attack from the outside. This will effect vulnerable OpenSSH library versions, which is essentially any public facing Linux server open on port 22. In my opinion, the likelihood on a real
And some thoughts about what it shows about our tooling trends
Arguing for three pillars of runtime application visibility (2/3)
Let me cook, we're making the future here! Part 1/3.
Threat Model -> Design -> Scan -> Scale