Top 5 Azure VM Security Blunders That Get You Owned
Top 5 Azure VM Security Blunders that will get you ownedAs more and more businesses embrace Azure Virtual Machines (VMs) to scale their IT infrastructure, ensuring the security of these VMs has become a top priority. However, some common security
Is Your Azure SQL at Risk? Learn How to Secure It with this Step-by-Step Guide
Azure SQL is a cloud-based relational database management system that is widely used by businesses and organizations around the world. It offers a range of security features to help protect data and prevent unauthorized access, ensuring that sensitive information remains
Identifying and Securing Hidden Attack Paths in Azure Infrastructure
Lateral movement attacks are a significant risk facing organizations that operate in the cloud. These attacks occur when an attacker gains access to a single resource within a network and then moves laterally to other resources within the same network.
Why We Started ARGOS – Cloud Security FOR Consultants
Today, we wanted to give you a little history lesson into why we started ARGOS. What lead us to build this Cloud Security SaaS in a time where there seemingly already are so many others around? /*! elementor - v3.9.2 -
How to make sense of CSPM, CAASM, CIEM, CNAPP
Did you come here because you typed "What is CSPM" or "Do I need a CIEM?" into the search engine? Maybe even "Do I really need 20 different security products?". You're not alone. These are questions we have been hearing from
How to Detect Potentially Dangerous Dangling DNS on AWS
Dangling DNS records are a real security issue and without going into too much detail as to why this is, here is a quick overview of what "dangling DNS" means in the context of AWS. If you do want to know
How to Monitor for Secrets in AWS Lambda
AWS Lambda Functions have been, are and will be a major part of most AWS implementations. They are super handy, quick to develop, can be really cheap and generally just does what it needs to do. In general it is considered
How To Monitor For Risky Public Azure Virtual Machines
Public Azure Virtual Machines are one of the most exploited resources in the Azure cloud. As we mentioned in our recent white paper (here) it only takes a few seconds on average for someone to test your Virtual Machine for