Securing the Cloud June 7, 2022 4 Tips for an Airtight Kubernetes Security Policy By Dotan Nahum Kubernetes powers significant automation capabilities for developers in deploying, managing, scaling, and ...
Securing the Cloud May 27, 2022 The IaC Showdown: Terraform vs. Ansible By Dotan Nahum Infrastructure as code (IaC) has become the de-facto method for dealing with ...
Securing the Cloud May 6, 2022 The complete guide to SSH keys in GitLab By Dotan Nahum April 20, 2022 No one wants to send their precious information over ...
Securing the Cloud May 6, 2022 Secure Your Migration to AWS, Part I: The Challenges By Mark Brindley, Head of Cloud Alliance The cloud provides the infrastructure backbone for most ...
Securing the Cloud May 5, 2022 The Age of Zero-day Java Vulnerabilities Spring4Shell, Log4j and a few good tips for staying secure By Idan Sofer May 5th, ...
Securing the Cloud April 22, 2022 GitLab vs GitHub: Which is right for you? By Dotan Nahum It is safe to say that most code in the world resides ...
Securing the Cloud April 18, 2022 The Biggest Cloud Security Challenges in 2022 | Check Point Software Cloud Adoption Grown Rapidly Cloud adoption has grown rapidly in recent years. While many organizations ...
Securing the Cloud April 8, 2022 Code Review Checklist: 8 steps to improved productivity By Dotan Nahum Code review is the best way to maintain a high level of ...
Securing the Cloud April 6, 2022 Day-1 Protection against Java Spring Framework Vulnerability with Check Point CloudGuard Workload Security Container Runtime Protection As mentioned in the previous Check Point blog regarding Check Point CloudGuard AppSec’s preemptive protection ...
Securing the Cloud March 31, 2022 Spring4Shell Zero-Day Vulnerability Vulnerability Discovered in Java Spring Framework. Check Point Customers using CloudGuard AppSec preemptive protection are ...