Did you come here because you typed "What is CSPM" or "Do I need a CIEM?" into the search engine? Maybe even "Do I really need 20 different security products?".You're not alone. These are questions we have been hearing from
AWS Lambda Functions have been, are and will be a major part of most AWS implementations. They are super handy, quick to develop, can be really cheap and generally just does what it needs to do. In general it is considered
Public Azure Virtual Machines are one of the most exploited resources in the Azure cloud. As we mentioned in our recent white paper (here) it only takes a few seconds on average for someone to test your Virtual Machine for
One of probably the most commonly referred to services in breaches / data leaks is Amazon AWS's storage service S3. Why? Because it is easy to misconfigure it. We even mentioned it as one of the most common misconfigurations in
A very common feature request over the last few months was to enable people in the ARGOS ecosystem to write custom functionality against our APIs. Initially this was not possible as we did not expose our APIs for direct consumption.