Reaching for the Clouds with Our $70M Series B Financing
Ermetic is proud to have closed our Series B financing, enabling us to continue building the best cloud security platform…
Testing the Waters: First Impressions of CloudTrail Lake
Our first impressions of AWS’s new managed audit and security lake that allows you to aggregate, immutably store, and query…
Tracking Adversaries in AWS using Anomaly Detection, Part 1
Minimizing the impact of a breach by identifying malicious actors’ anomalous behavior and taking action.
Tracking Adversaries in AWS using Anomaly Detection, Part 2
Going through the cyber “kill chain” with Pacu and using automated analysis to detect anomalous behavior
How to Start Up Your Cloud Security
Startups may think they can postpone implementing a cloud security program but should in fact take early action – here’s…
Protect Your AWS Environment Beyond Patching Log4j
The crucial strategic lessons overlooked by enterprises dealing with the recently reported Log4j vulnerability.
Top 7 Questions to Ask During a POC with a Cloud Security Vendor
A useful set of questions to help you get the most out of your upcoming POC — and ensure that…
Top 6 Questions You Should Ask a Cloud Security Vendor
Choosing a cloud security platform and tools is not for the weak of heart – so much at stake! This…
Ermetic Cloud Security Predictions for 2022
Remote work, which is here to stay, has become the cloud’s killer app. Here are our five security predictions for…
SEGA’s Saga of Nearly Compromised Credentials
A look at VPNO’s recent findings of publicly accessible S3 buckets on SEGA’s infrastructure and what we can learn from…
Not Just Buckets: Are You Aware of ALL Your Public Resources?
A misconfiguration of resource based policies can inadvertently make resources public. Do you have such misconfigured policies present in your…
Don’t Hide Your Secrets in Plain Sight
The not-so-sensitive locations that may tempt you when storing sensitive information — why to avoid them and how
Access Keys: An Unintended Backdoor-by-Design to Azure Storage Accounts Data
The importance of understanding the assignments of Azure resource roles when giving permissions.
The ABCs of Azure Identity Governance Tools
The main Azure mechanisms for governing identities and providing access permissions.
Deconstructing Azure Access Management using RBAC
The basics of Azure RBAC — the main mechanism in Azure for granting permissions to resources.