We’re changing the way consultants assess Azure Subscriptions and detect Attack Paths. All you need is “Reader” access to an…

We’re changing the way consultants assess Azure Subscriptions and detect Attack Paths. All you need is “Reader” access to an…
In the sprawling metropolis of cloud environments, Azure shines as a central hub, teeming with a myriad of services. However, amidst this vast expanse, lurk unseen alleyways known as lateral movement or attack paths, which could be exploited by adversaries to traverse through the cloud undetected.
In this article, we will detail the most common AKS misconfigurations, explain their security implications, and provide tips on how to detect and fix them using Azure CLI or Resource Graph examples.
Top 5 Azure VM Security Blunders that will get you owned As more and more businesses embrace Azure Virtual Machines…
Azure SQL is a cloud-based relational database management system that is widely used by businesses and organizations around the world.…
Lateral movement attacks are a significant risk facing organizations that operate in the cloud. These attacks occur when an attacker…
Today, we wanted to give you a little history lesson into why we started ARGOS. What lead us to build…
Often customers ask us how they can protect the information stored within ARGOS from individuals that should not have access…
Did you come here because you typed “What is CSPM” or “Do I need a CIEM?” into the search engine?…
Amazon Web Services (AWS) Identity and Access Management (IAM) is one of the things that is often, let’s say, overly…