Articles
-
Sep 25, 2024 |
aquasec.com | Lena Fuks
You’ve likely heard of Schrödinger’s Cat from quantum mechanics—both alive and dead until the box is opened. This paradox mirrors a critical risk in modern development: the secrets embedded in your code. You might assume they’re long deleted, but until you examine the depths of commit history, you can’t be certain. Recently, Aqua Nautilus team uncovered that secrets you thought were removed may remain exposed for years, waiting to be found by malicious actors.
-
Mar 1, 2024 |
techday.com.au | Lena Fuks |Rob Cottrill |Peter Stanski |Dan A. Smale
Overview Also known as AWS. Originally disrupting the book retailing business, Amazon Web Services has since emerged as a world’s leader in the provision of ‘as a Service’ computing resources.
-
Oct 23, 2023 |
itwire.com | Lena Fuks
GUEST OPINION by Lena Fuks, Aqua Security: In the ever-expanding realm of AWS, with over 200 services at our disposal, securing cloud account configurations and mastering complex environments can feel like an overwhelming challenge. To help prioritise and root them out, here's a guide for AWS configurations that are most commonly overlooked. It features five of the top misconfigurations that could be lurking in any AWS environment right now.
-
Oct 19, 2023 |
itbrief.com.au | Lena Fuks
In the ever-expanding realm of AWS, with over 200 services at our disposal, securing cloud account configurations and mastering complex environments can feel like an overwhelming challenge. To help prioritise and root them out, here's a guide for AWS configurations that are most commonly overlooked. It features five of the top misconfigurations that could be lurking in any AWS environment right now.
-
Sep 12, 2023 |
cloudsecurityalliance.org | Cloud Bytes Webinars |Lena Fuks
Written by Lena Fuks, Product Marketing Manager, Aqua Security. In a world increasingly reliant on cloud services, the protection of cloud environments is more critical than ever before. However, as these environments grow in complexity, and the risk of misconfiguration grows exponentially, safeguarding them becomes a difficult exercise. Cloud Security Posture Management (CSPM) addresses this challenge by providing a solution for continuous cloud security and compliance.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →