Samantha Cruz is a Cyber Security Engineer specializing in cloud security and compliance. Prior to joining Horangi, she has worked for Trend Micro and Pandora Security Labs.
Top Cloud Computing Security Threats To Watch For
Cloud computing provides users the convenience to spin up workloads without dealing with the overhead that comes with maintaining physical infrastructure, driving up adoption rates. With more and more organizations using the cloud in some form or another, it brings along with it a fair share of security threats.
Cloud Migration and Security Risks: The Good, the Bad, and the Ugly
With business operations shifting to a distributed, decentralized way of working, the need for organizations to migrate to the cloud has become acute in recent years. Here’s our take on what you need to know as cloud migration becomes the next step to scale your business.
Top 5 Cloud Security Controls You Should Be Using
With cloud environments increasing in size and number and cloud service providers releasing new services and features each year, it pays for organizations to shore up their cloud defenses with these top cloud security controls.
General Data Protection Regulation (GDPR) Compliance: Horangi Warden's Newest Standard
Organizations that need to be compliant to the General Data Protection Regulations (GDPR) can now report on compliance posture in just one click.
One-click Remediation is now available on Horangi Warden!
Warden can now enable even faster reaction times, where failed findings are rectified and remediated swiftly with a single command.
Top 3 GCP Configurations To Watch For
The cost of a security breach can have severe financial and reputation impact. Still, your organizations can avoid mistakes like these by configuring your GCP resources in a way that minimizes your security risks.
IaaS vs PaaS vs SaaS: Know Your aaS-es
Whether you’re starting a Cloud-native solution from the ground-up or migrating existing on-premise workloads to the Public Cloud, one crucial decision to make is what cloud delivery model you want to use for your organization.
Ensuring Continuous Cloud Compliance with ISO 27001
Continuous compliance isn’t just ticking all checkboxes on a list. It’s a conscious building of a business culture that continuously monitors compliance posture. What are the sections that apply to the cloud?
Unboxing CSPM As The Answer To IaaS Security Risks
With more organizations migrating to the cloud, the risks stemming from misconfiguration and rapid scaling increases along with it. How do CSPMs help address these cloud security risks?
13 Compliance Frameworks For Cloud-Based Organizations
The need for cloud compliance begins as soon as you build on the cloud. Considering the shared responsibility of cloud security, which are the regulatory frameworks that you need to be aware of?
Release Notes Jan 2020: New Compliance Standards Supported
We previously released new features to drive automated cloud compliance on Warden. This time, we added two new compliance standards and more ways to action on compliance check results.
Release Notes Nov 2019: Compliance Now Supported
We’re excited to tell you about a new set of features to help you with compliance. Also in this release are the ability to manage vulnerabilities in bulk and export findings.
The Real Cost of Cloud Compliance (or Lack of It)
Gearing up for cloud compliance happens the second you deploy your data to the cloud. Here, we explore what it is, why it matters, and how to make sure your cloud infrastructure is compliant with the latest standards.
Release Notes Sep 2019: Vulnerability Management Beta
Introducing our newest beta feature — Vulnerability Management. Also in this release — the first look at the CIS Benchmark integrated into Warden findings and a new way to filter your findings.
Release Notes Jun 2019: Storyfier Now Integrated With Slack
Horangi Storyfier is now integrated with your Slack account so you never miss a notification.
Release Notes May 2019: Horangi Warden on AWS Marketplace
Horangi Warden is now on AWS Marketplace!
Release Notes Apr 2019: Horangi Storyfier Updates
We’re excited to introduce to you a new series called Release Notes, where we’ll highlight all the improvements we’ve launched so you can easily stay up-to-date on what’s new.
How to lose money to (credential) stocking stuffers
Credential Stuffing is an emerging form of attack that uses automated scripts to try out username or password pairs to gain access to a system.
Hash Lookup Using FileIntel
Why do Hash Lookups? Looking up cryptographic hashes of files is done for various reasons.
10 Effective Ways to Boost your Cybersecurity Defenses
One can build complex, sophisticated system of defenses to protect themselves, but just one hole, and the game’s up before it even started. The good news is there are many simple ways users can protect themselves and their data