First encyclopedia for cloud risks

B2B Cyber ​​Security ShortNews

Share post

Continuously updated information source for cloud security best practices. Orca Security launches industry-first cloud risk encyclopedia. Cloud Security Innovator opens its collection of 900+ covered cloud risks along with targeted remediation strategies to share industry knowledge.

Orca Security, the innovation leader in cloud security, today released the Orca Cloud Risk Encyclopedia, which serves as a global resource for practitioners and researchers throughout the InfoSec community. The rapid adoption of clouds, the increasing complexity of multi-cloud, and the lack of cloud security professionals have all contributed to widening the cloud security knowledge gap. Orca Security therefore relies on education and transparency. The company provides the same collection of public cloud risks and remediations found in the Orca Security platform, including new discoveries like Superglue and BreakingFormation.

Encyclopedia of 900+ cloud risks

Orca Security knows that staying on top of the growing number of public cloud security risks can be challenging for security professionals," said Mor Himi, VP, Applied Threat Research and leader of the Orca Security research team, as "Orca Research called Pod”. "We hope we can help IT security professionals protect their public cloud environments and make the cloud a safer place for all of us by sharing information about our Research uncovered risks and remedial steps.”

Orca Security's research team's insights into vulnerabilities and incidents are continuously recorded in the Orca Cloud Risk Encyclopedia, serving as a learning center for cloud security professionals, researchers, developers, and the press. This valuable resource includes:

  • Important information about the latest cloud security risks: The encyclopedia contains detailed descriptions of cloud security risks, an assessment showing which risks are most critical, and remediation steps.
  • Best practices to avoid security breaches: By providing a comprehensive collection of cloud security risks along with best practices, security teams can implement preventive measures to improve their security posture.
  • Which risks apply to specific compliance frameworks: By filtering risks for a specific compliance framework or CIS benchmark, security professionals can research the top cloud security risks impacting their compliance programs.

"The increasingly complex public cloud landscape requires a different approach to security," commented Avi Shua, CEO and co-founder of Orca Security. “Enterprises need a comprehensive view of their rapidly evolving cloud estate to identify problems, close neglected entry points, and improve their security posture. The opening of a core part of our platform in the form of our Cloud Risk Encyclopedia is consistent with our commitment to increasing transparency in the cybersecurity industry. Our goal is to help shift the balance of power back in favor of defenders and away from attackers.”

More at Orca.security

 


About Orca Security

Orca Security delivers out-of-the-box security and compliance for AWS, Azure, and GCP—without the gaps in coverage, alert fatigue, and operational costs of agents or sidecars. Simplify cloud security operations with a single CNAPP platform for workload and data protection, cloud security posture management (CSPM), vulnerability management, and compliance. Orca Security prioritizes risks based on security issue severity, accessibility, and business impact.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more