Press
Horangi Completes Smart Contract Audit for Hashport, Ensuring Security and Reliability
Smart contract audits are essential for minimizing the possibilities for attacker exploits. Horangi followed a rigorous methodology to deliver a detailed analysis of the smart contracts, an assessment of the risks, and a comprehensive report with recommendations for improvements to Hashport. Read on to know more.
Anagha Rakta . Mar 27 2023

Press
Horangi Completes Smart Contract Audit for Hashport, Ensuring Security and Reliability
Smart contract audits are essential for minimizing the possibilities for attacker exploits. Horangi followed a rigorous methodology to deliver a detailed analysis of the smart contracts, an assessment of the risks, and a comprehensive report with recommendations for improvements to Hashport. Read on to know more.
Anagha Rakta . Mar 27 2023

Press
Horangi Warden Mentioned as a CSPM Vendor in Gartner’s DevSecOps Report 2023
Gartner’s latest report ‘How to Select DevSecOps Tools for Secure Software Delivery’ talks about integrating developer-friendly security tools into your DevOps pipeline, where our product Warden is mentioned as a sample Cloud Security Posture Management (CSPM) tool.
Anagha Rakta . Feb 22 2023

Press
Horangi Warden Mentioned as a CSPM Vendor in Gartner’s DevSecOps Report 2023
Gartner’s latest report ‘How to Select DevSecOps Tools for Secure Software Delivery’ talks about integrating developer-friendly security tools into your DevOps pipeline, where our product Warden is mentioned as a sample Cloud Security Posture Management (CSPM) tool.
Anagha Rakta . Feb 22 2023

Compliance
Cloud Compliance 101 [Infographic]
Compliance is never “one and done”. Given the highly dynamic, distributed nature of cloud environments and the fact that the rate of cloud deployments is only accelerating, cloud compliance can be exceedingly complex. Read on to learn about cloud compliance and and how automation can help you streamline auditing.
Anagha Rakta . Feb 10 2023

Compliance
Cloud Compliance 101 [Infographic]
Compliance is never “one and done”. Given the highly dynamic, distributed nature of cloud environments and the fact that the rate of cloud deployments is only accelerating, cloud compliance can be exceedingly complex. Read on to learn about cloud compliance and and how automation can help you streamline auditing.
Anagha Rakta . Feb 10 2023

Cyber Threats
What We Learned from the Biggest Data Breaches of 2022
Uber, Samsung, Twitter, Microsoft and more are among some of the biggest names affected in data breaches from last year. It goes to show that small or big, all organizations who use cyberinfrastructure can be at risk of a major security breach. Here are the key takeaways from the 10 biggest data breaches of 2022.
Anagha Rakta . Jan 19 2023

Cyber Threats
What We Learned from the Biggest Data Breaches of 2022
Uber, Samsung, Twitter, Microsoft and more are among some of the biggest names affected in data breaches from last year. It goes to show that small or big, all organizations who use cyberinfrastructure can be at risk of a major security breach. Here are the key takeaways from the 10 biggest data breaches of 2022.
Anagha Rakta . Jan 19 2023

Cloud Security
Zero Trust 101 [Infographic]
The Zero Trust Security Model is not something that can be bought off-the-shelf, installed and implemented like many security products. It is a security framework based on a set of principles, which removes any implicit trust and enforces a “trust none, verify always” security model to safeguard your cloud infrastructure. Read on to understand the basics of Zero Trust and the Principle of Least Privilege (PoLP).
Anagha Rakta . Jan 12 2023

Cloud Security
Zero Trust 101 [Infographic]
The Zero Trust Security Model is not something that can be bought off-the-shelf, installed and implemented like many security products. It is a security framework based on a set of principles, which removes any implicit trust and enforces a “trust none, verify always” security model to safeguard your cloud infrastructure. Read on to understand the basics of Zero Trust and the Principle of Least Privilege (PoLP).
Anagha Rakta . Jan 12 2023

Events
How to Combat Alert Fatigue with Horangi Warden for Fastest Path to Compliance & Monitoring
Read on to learn great security insights and best practices from our product managers that can help bolster cloud security and threat management programs, while reducing your operating costs by 70%.
Anagha Rakta . Sep 28 2022

Events
How to Combat Alert Fatigue with Horangi Warden for Fastest Path to Compliance & Monitoring
Read on to learn great security insights and best practices from our product managers that can help bolster cloud security and threat management programs, while reducing your operating costs by 70%.
Anagha Rakta . Sep 28 2022

Cyber Threats
Threat Detection & Response: Prevention is Not Enough for your Cloud Security Strategy
It’s no secret that getting breached is a nightmare scenario, and it takes about 280 days for incident responders to detect and contain a breach, on average. Warden is enriched with intelligent threat detection for your multi-cloud environment, and continuously provides valuable detection use cases to enhance your company’s overall security posture.
Anagha Rakta . Sep 13 2022

Cyber Threats
Threat Detection & Response: Prevention is Not Enough for your Cloud Security Strategy
It’s no secret that getting breached is a nightmare scenario, and it takes about 280 days for incident responders to detect and contain a breach, on average. Warden is enriched with intelligent threat detection for your multi-cloud environment, and continuously provides valuable detection use cases to enhance your company’s overall security posture.
Anagha Rakta . Sep 13 2022

Press
Horangi Warden Helps Pave the Way for the Launch of Bank Islam’s Digital Banking Proposition, Be U
Anticipated as the cornerstone of all upcoming digital banks in Malaysia, Bank Islam launched Be U, a fully cloud-native digital banking application, on 18 July 2022, targeted at the digital-native, younger generation. Horangi, a leading cloud security solutions and services firm based in Singapore, was a significant part of that journey with Bank Islam by providing its flagship cloud security platform, Warden, for Be U’s launch. Read more below!
Anagha Rakta . Aug 17 2022

Press
Horangi Warden Helps Pave the Way for the Launch of Bank Islam’s Digital Banking Proposition, Be U
Anticipated as the cornerstone of all upcoming digital banks in Malaysia, Bank Islam launched Be U, a fully cloud-native digital banking application, on 18 July 2022, targeted at the digital-native, younger generation. Horangi, a leading cloud security solutions and services firm based in Singapore, was a significant part of that journey with Bank Islam by providing its flagship cloud security platform, Warden, for Be U’s launch. Read more below!
Anagha Rakta . Aug 17 2022

Press
[Infographic] Cost of Attacks and Top Threats to Financial Institutions in 2022
Being prime targets for cyber attacks because of the high volume of personal information and financial assets, financial institutions experience more breaches while costs continue to rise. Securing your data on the cloud is vital to business and might save you from potential financial loss. Read on to know about top threats that can put your company’s assets at risk and best practices that can make a positive impact on your cloud security.
Anagha Rakta . Aug 5 2022

Press
[Infographic] Cost of Attacks and Top Threats to Financial Institutions in 2022
Being prime targets for cyber attacks because of the high volume of personal information and financial assets, financial institutions experience more breaches while costs continue to rise. Securing your data on the cloud is vital to business and might save you from potential financial loss. Read on to know about top threats that can put your company’s assets at risk and best practices that can make a positive impact on your cloud security.
Anagha Rakta . Aug 5 2022
