CloudSec Academy
CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。
Top IaC Tools and Practices to Strengthen Code and Cloud Security
The best Infrastructure as Code (IaC) tools, curated by use case and categorized into CSP-specific and CSP-neutral providers.
10 Open-Source SOC tools
Cloud security operations center (SOC) tools are the security solutions used by SOC teams to track and triage threats and vulnerabilities in cloud environments.
How to Create an Incident Response Policy: An Actionable Checklist and Template
Build a strong incident response policy to manage cybersecurity crises with clear roles, compliance steps, and hands-on training.
CSPM in AWS
In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.
Top OSS SCA tools
Open-source software (OSS) software composition analysis (SCA) tools are specialized solutions designed to analyze an application's open-source components and dependencies.
The Open-Source CNAPP Toolkit
With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.
Top OSS Incident Response Tools
Open-source software (OSS) incident response (IR) tools are publicly available tools enterprises use to effectively manage and respond to numerous security threats.
Top 9 OSINT tools
Open-source intelligence (OSINT) is a framework that involves gathering, analyzing, and interpreting publicly available data to gain insights into cyber threats, adversarial activities, and attack techniques. OSINT identifies innocuous-seeming information that, if analyzed with an attacker’s mindset, could reveal critical loopholes in an enterprise’s security posture.
Top OSS Vulnerability Scanners [By Category]
Vulnerability scanning is an integral component of every vulnerability management program, providing security teams with insights needed to address vulnerabilities before they become attack vectors. When conducted regularly, vulnerability assessments offer asset discovery and visibility, attack surface management, and compliance enforcement.
The 13 Must-Follow Threat Intel Feeds
A threat intel feed, or threat intelligence feed, provides a continuous incoming flow of data related to cyber threats and risks.
The Top 8 OSS Threat Intelligence Tools
In this blog post, we’ll shine a light on the top OSS threat intelligence platforms and tools that enterprises can integrate into their security stack.
Top 14 OSS Application Security Tools by Use Case
The top 14 open-source application security tools—including SCA, secrets scanning, and application security testing tools—to help you streamline the critical process of securing your apps from threats and vulnerabilities.
Top 9 OSS API Security Tools
A guide on the 9 best OSS API security tools that protect sensitive data, infrastructure, and business logic from unauthorized access, data theft, and other attacks.
Top 9 OSS CSPM Tools
In this article, we’ll explore the top 9 OSS CSPM tools available today, each with its unique capabilities and benefits for helping organizations identify cloud misconfigurations, prevent security breaches, and ensure compliance with industry standards.
7 Incident Response Plan Templates & Examples
Writing your IR plan from scratch? Not sure where to begin? Get a head start with these free templates and examples.
Native Azure Security Tools
This blog explores the significance of security in Azure environments and provides an overview of native as well as third-party security tools available to improve an organization’s Azure security stance.
Top Google Cloud Security Tools [By Use Case]
10 native tools for IAM, data protection, network security, threat detection, and compliance management.
Open-source Container Security Tools [By Use Case]
We cover the top container security tools across 7 common use cases, including image scanning, compliance, secrets management, and runtime security.
Kubernetes Alternatives for Container Orchestration
This blog post explores the world of container orchestration tools beyond Kubernetes, highlighting cloud provider tools and open-source alternatives that promise to redefine how we deploy and manage applications.
AIセキュリティツール:オープンソースツールキット
MLSecOps の 5 つの基本領域をレビューし、組織にとっての MLSecOps の重要性の高まりを探り、6 つの興味深いオープンソース ツールを紹介することで、MLSecOps ツールの状況を深く掘り下げます
Types of Cloud Security Tools
Explore the security roles your tools should cover, then outline the key tool types to help you build your security workflows.
DevSecOps Tools: 11 Open-Source Tools By Use Case
Read on for a roundup of top open-source tools that are game-changers when it comes to securing your development and operations pipeline.
The Open-Source Code Security Tool Roundup
This article will give you a refresher on code security and review the most popular open-source code security tools available.