Stay up to date

Most viewed articles

ARMO Expands Opportunities with Red Hat Certified Operator for OpenShift

Cyber Armor has now achieved Red Hat Operator certification for OpenShift. The collaboration extends Cyber...

The inspiration behind ARMO by Leonid Sandler, Founder and CTO

Leonid Sandler, Co-Founder and CTO of Cyber Armor, set for an interview with Safety Detective’s...

What COVID-19 teaches us about Micro-segmentation and Run-time Cloud Workload Protection

In many ways, software malware and biological viruses are similar, therefore it made sense for...

Recently found Azure vulnerabilities underline the importance of Zero-Trust for cloud workloads

Two vulnerabilities found in Microsoft’s Azure cloud services have been recently published by researchers. These...

Do you trust your Microservices Identities?

A few fundamental security problems exist in the traditional microservices identity authentication Methods. These problems...

The Migration Path to Microservices & Security Considerations, Of Course

While the move to microservices-based architecture is relatively new, it is already mainstream. A majority...

The Growth of Confidential Computing

Confidential Computing technology is an important step toward a safer digital space. Building the right...

Cloud Migration: Moving Your Security Mindset Along with Your Data

Migrating our data to the cloud has never been easier in terms of technology. So...

The Chicken & Egg Secret Protection Problem in Micro-services

Certificate, private keys, encryption keys, and other secrets proliferate in a secured cloud native environment....