Samantha Cruz is a Cyber Operations Researcher at Horangi specializing in cyber research and security tool development. Before joining Horangi, she has worked for Trend Micro as a security analyst and engineer.
We’re excited to tell you about a new set of features to help you with compliance. Also in this release are the ability to manage vulnerabilities in bulk and export findings.
Gearing up for cloud compliance happens the second you deploy your data to the cloud. Here, we explore what it is, why it matters, and how to make sure your cloud infrastructure is compliant with the latest standards.
Introducing our newest beta feature — Vulnerability Management. Also in this release — the first look at the CIS Benchmark integrated into Warden findings and a new way to filter your findings.
In July’s edition of Storyfier Release Notes, we present the newest feature available for our Code Scanner customers, more customization options on Storyfier, and our new blog interface.
Our Product Engineering team has been working hard to push out new Storyfier features, improvements and bug fixes. Let’s take a look at what we’ve just released for June. Slack Integration Storyfier is now integrated with your Slack account so you never miss a notification. Once you connect Slack to Storyfier, we will send you regular organization updates so you
The Horangi product engineering team has been working hard to push out new features, improvements and bug fixes for the month of May. Let’s take a look at what we’ve just released. Warden is now on AWS Marketplace! First things first, Warden is now available on AWS Marketplace. This is a very big step for us here at Horangi as
We’re excited to introduce to you a new series called Release Notes, where we’ll highlight all the improvements we’ve launched every month, so you can easily stay up-to-date on what’s new. The Horangi product engineering team has been working hard to push out new features, improvements and bug fixes for the past few months. Let’s take a look at what
The last quarter of 2018 has not been the best for companies, as far as cybersecurity is concerned. In December alone, the international hotel chain, Marriott Hotel, experienced a breach that exposed the personal information of as many as 500 million of its customers, including the details of their payment information. Joining the ranks of the unfortunate organizations was the
Why do Hash Lookups? Looking up cryptographic hashes of files is done for various reasons. The first and most common reason is to verify the integrity of a particular file. This is demonstrated in practically every Linux distro download on the web (this is especially vital to prevent headaches arising from corrupted downloads of the ISO file). Another reason to
“You are your data.” It’s a no-brainer to say that data is an everyday part of an average person’s lifetime. People of all ages and backgrounds are connected to the cybersphere doing things like communicating with others, getting work done, and even having some fun. Technology has evolved and advanced exponentially, enabling people people get things done more easily and