Cisco Announces its Intent to Acquire Lightspin
Cisco Announces its Intent to Acquire Cloud Security Software Company Lightspin
Dana Tsymberg is a Cloud Security Researcher in Lightspin’s Security Research team. Dana served in C4I and Cyber Defense unit and later worked in MIS and R&D teams in several companies. Dana has a passion for working with data, researching and developing new attack paths and comes with previous experience as a Cyber Security Analyst working in Check Point, where she researched mobile applications.
Cisco Announces its Intent to Acquire Cloud Security Software Company Lightspin
Lightspin is proven to significantly reduce the risk of a breach and detect and remediate malware reducing cybersecurity risk with an ROI of up to 700%.
Graph technology can help examine your data from a new perspective; find out how graph technology may find previously unseen relationships in your data.
This post describes how I took over an Azure Cloud Shell trusted domain and leveraged it to inject and execute commands in other users’ terminals.
Agentless scanning is an important security tool. We discuss how agentless scanning works, how it differs from agent-based scanning, and whether you need both.
Lightspin created a public repository with common use cases to simulate unusual/malicious activities within the Kubernetes cluster.
Cloud security is an ongoing requirement for all organizations born and built in the cloud. One way to probably demonstrate security controls is with a SOC 2 report.
Introducing our self-serve Free plan, and a jam-packed Premium offering. We’ve removed the guesswork from the traditional software buying process.
Curious about DevSecOps? We explain what DevSecOps is, how it works, and how integrating security throughout development helps create more secure systems.
The Complete Guide to AWS KMS. AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the cryptographic keys used to protect ...
To understand how dangling domains can result in an attack path, we first need to understand what DNS server and DNS records are and how they ...
The 7 most common attack paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform.
Lightspin reveals several ways an attacker could potentially access your sensitive data using Redshift COPY command.
In this blog we examine EMR's default roles and managed policies to understand if they follow security best practices of least privileges.
Leverage predictive attack path analysis and keep attackers out of your environment
To understand how dangling domains can result in an attack path, we first need to understand what DNS server and DNS records are and how they ...
The 7 most common attack paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform.
Lightspin reveals several ways an attacker could potentially access your sensitive data using Redshift COPY command.
In this blog we examine EMR's default roles and managed policies to understand if they follow security best practices of least privileges.
© 2023 Lightspin