CALDERA Tutorial: Features, Use Cases, How It Works
Explore CALDERA, an open-source platform for automated red team exercises and breach and attack simulation.
Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.
Explore CALDERA, an open-source platform for automated red team exercises and breach and attack simulation.
Discover BloodHound Community Edition, a graph-based tool for attack path analysis and privilege escalation mapping in Azure/AD.
Discover Atomic Red Team: an open-source framework for validating security controls using simple MITRE ATT&CK tests.
Discover Volatility 3, the essential memory forensics framework for incident response, malware analysis, and digital investigations.
Wiz connects the dots across your cloud, from code to runtime.
Protect your sensitive data from modern threats. Learn what database security is, its business significance, and best practices to fortify your defenses.
Discover how a vulnerability management program can enhance your cloud security, plus how contextual assessments can turn your security from passive to active.
Discover what cloud network security is and learn tips for unifying your multi-cloud environment to boost security and compliance with full visibility.
Learn how to configure Kubernetes security contexts, avoid common misconfigurations, and apply best practices for running secure clusters in production.
Explore 20 free code security scanners for multiple programming languages, along with their features and limitations, to find the right tool for your needs.
Get the top 10 threat intelligence tools for 2025—key features and limitations. This master list covers the best TI feeds and tools for your environment.
File integrity monitoring (FIM) can protect your data through early detection. Learn how to use it, as well as how to enhance compliance and security.