Cisco Announces its Intent to Acquire Lightspin
Cisco Announces its Intent to Acquire Cloud Security Software Company Lightspin
Noga Yam Amitai is Lightspin's Cloud Security Researcher and plays a major role in all analysis, research, and product-related tasks at the company. Before joining Lightspin, Noga served as a Cyber Security Analyst and later Product Manager in the elite Israeli intelligence 8200 unit. Noga has a passion for working with data, both for creating new detection for our software and in creating the data that we have conveniently accessible for every member of the team, and is always looking for new ways to improve cloud security.
Cisco Announces its Intent to Acquire Cloud Security Software Company Lightspin
Lightspin is proven to significantly reduce the risk of a breach and detect and remediate malware reducing cybersecurity risk with an ROI of up to 700%.
Graph technology can help examine your data from a new perspective; find out how graph technology may find previously unseen relationships in your data.
This post describes how I took over an Azure Cloud Shell trusted domain and leveraged it to inject and execute commands in other users’ terminals.
Agentless scanning is an important security tool. We discuss how agentless scanning works, how it differs from agent-based scanning, and whether you need both.
Lightspin created a public repository with common use cases to simulate unusual/malicious activities within the Kubernetes cluster.
Cloud security is an ongoing requirement for all organizations born and built in the cloud. One way to probably demonstrate security controls is with a SOC 2 report.
Introducing our self-serve Free plan, and a jam-packed Premium offering. We’ve removed the guesswork from the traditional software buying process.
Curious about DevSecOps? We explain what DevSecOps is, how it works, and how integrating security throughout development helps create more secure systems.
The Complete Guide to AWS KMS. AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the cryptographic keys used to protect ...
In this post, we cover the integration between KMS and Secrets Manager on AWS, to better understand how they work.
The Complete Guide to AWS KMS. AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the ...
Take a look at Lightspin's examination of GCP's storage service, how to access buckets, and how to make sure your buckets are configured as intended.
Get a closer look at EKS authentication every step of the way, from creating a cluster to using Kubectl to run commands on your cluster.
Part two of our two-part series looks at specific risks of misconfigured S3 buckets and Lightspin's discovery of a cross-account attack path.
Leverage predictive attack path analysis and keep attackers out of your environment
In this post, we cover the integration between KMS and Secrets Manager on AWS, to better understand how they work.
The Complete Guide to AWS KMS. AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the ...
Take a look at Lightspin's examination of GCP's storage service, how to access buckets, and how to make sure your buckets are configured as intended.
Get a closer look at EKS authentication every step of the way, from creating a cluster to using Kubectl to run commands on your cluster.
Part two of our two-part series looks at specific risks of misconfigured S3 buckets and Lightspin's discovery of a cross-account attack path.
Discover what an S3 bucket is and how AWS handles access and permissions.
© 2023 Lightspin