We’re changing the way consultants assess Azure Subscriptions and detect Attack Paths. All you need is “Reader” access to an…

We’re changing the way consultants assess Azure Subscriptions and detect Attack Paths. All you need is “Reader” access to an…
Top 5 Azure VM Security Blunders that will get you owned As more and more businesses embrace Azure Virtual Machines…
Azure SQL is a cloud-based relational database management system that is widely used by businesses and organizations around the world.…
Lateral movement attacks are a significant risk facing organizations that operate in the cloud. These attacks occur when an attacker…
Today, we wanted to give you a little history lesson into why we started ARGOS. What lead us to build…
Did you come here because you typed “What is CSPM” or “Do I need a CIEM?” into the search engine?…
Public Azure Virtual Machines are one of the most exploited resources in the Azure cloud. As we mentioned in our…
Just recently Wiz released an announcement into a very critical vulnerability in one of Microsoft Azure’s flagship services, Azure Cosmos DB. Because these…