Anagha is a Product Marketing Executive for Warden at Horangi. She is a literature graduate with a sweet tooth and a funny bone, and is passionate about writing, design, and everything Product.
CSPM, DevSecOps, and PoLP: How Warden Supports the Three Pillars of Cloud Security
Cloud security relies on three essential pillars: CSPM (Cloud Security Posture Management), DevSecOps (Development Security Operations), and PoLP (Principle of Least Privilege). These pillars form a solid foundation for comprehensive cloud security, protecting infrastructure, data, and applications. Read on to know how Horangi's tool, Warden, ensures resilience against emerging threats in the dynamic cloud environment.
Horangi Completes Smart Contract Audit for Hashport, Ensuring Security and Reliability
Smart contract audits are essential for minimizing the possibilities for attacker exploits. Horangi followed a rigorous methodology to deliver a detailed analysis of the smart contracts, an assessment of the risks, and a comprehensive report with recommendations for improvements to Hashport. Read on to know more.
Horangi Warden Mentioned as a CSPM Vendor in Gartner’s DevSecOps Report 2023
Gartner’s latest report ‘How to Select DevSecOps Tools for Secure Software Delivery’ talks about integrating developer-friendly security tools into your DevOps pipeline, where our product Warden is mentioned as a sample Cloud Security Posture Management (CSPM) tool.
Cloud Compliance 101 [Infographic]
Compliance is never “one and done”. Given the highly dynamic, distributed nature of cloud environments and the fact that the rate of cloud deployments is only accelerating, cloud compliance can be exceedingly complex. Read on to learn about cloud compliance and and how automation can help you streamline auditing.
What We Learned from the Biggest Data Breaches of 2022
Uber, Samsung, Twitter, Microsoft and more are among some of the biggest names affected in data breaches from last year. It goes to show that small or big, all organizations who use cyberinfrastructure can be at risk of a major security breach. Here are the key takeaways from the 10 biggest data breaches of 2022.
Zero Trust 101 [Infographic]
The Zero Trust Security Model is not something that can be bought off-the-shelf, installed and implemented like many security products. It is a security framework based on a set of principles, which removes any implicit trust and enforces a “trust none, verify always” security model to safeguard your cloud infrastructure. Read on to understand the basics of Zero Trust and the Principle of Least Privilege (PoLP).
How to Combat Alert Fatigue with Horangi Warden for Fastest Path to Compliance & Monitoring
Read on to learn great security insights and best practices from our product managers that can help bolster cloud security and threat management programs, while reducing your operating costs by 70%.
Threat Detection & Response: Prevention is Not Enough for your Cloud Security Strategy
It’s no secret that getting breached is a nightmare scenario, and it takes about 280 days for incident responders to detect and contain a breach, on average. Warden is enriched with intelligent threat detection for your multi-cloud environment, and continuously provides valuable detection use cases to enhance your company’s overall security posture.
Horangi Warden Helps Pave the Way for the Launch of Bank Islam’s Digital Banking Proposition, Be U
Anticipated as the cornerstone of all upcoming digital banks in Malaysia, Bank Islam launched Be U, a fully cloud-native digital banking application, on 18 July 2022, targeted at the digital-native, younger generation. Horangi, a leading cloud security solutions and services firm based in Singapore, was a significant part of that journey with Bank Islam by providing its flagship cloud security platform, Warden, for Be U’s launch. Read more below!
[Infographic] Cost of Attacks and Top Threats to Financial Institutions in 2022
Being prime targets for cyber attacks because of the high volume of personal information and financial assets, financial institutions experience more breaches while costs continue to rise. Securing your data on the cloud is vital to business and might save you from potential financial loss. Read on to know about top threats that can put your company’s assets at risk and best practices that can make a positive impact on your cloud security.