
Southeast Asian Cybersecurity Startup Horangi Is The First To Offer Compliance Automation For Huawei Cloud
Horangi now provides compliance automation for the Huawei Cloud Security Configuration, allowing customers of Huawei Cloud to check their compliance posture against the latest security best practices.

Southeast Asian Cybersecurity Startup Horangi Is The First To Offer Compliance Automation For Huawei Cloud
Horangi now provides compliance automation for the Huawei Cloud Security Configuration, allowing customers of Huawei Cloud to check their compliance posture against the latest security best practices.
Explore:
Featured List

What Is PCI DSS 4.0 And How To Make Your Compliance Journey Easier?
Time is of the essence when you have just about two years to comply with the new PCI DSS 4.0 standard by 21 March 2024. Whether you are starting from scratch or updating your compliance from the current PCI DSS v3.2.1, read on to find out how your organization can use Warden's Compliance Automation to comply with PCI DSS v4.0 faster and with less pain.

What Is PCI DSS 4.0 And How To Make Your Compliance Journey Easier?
Time is of the essence when you have just about two years to comply with the new PCI DSS 4.0 standard by 21 March 2024. Whether you are starting from scratch or updating your compliance from the current PCI DSS v3.2.1, read on to find out how your organization can use Warden's Compliance Automation to comply with PCI DSS v4.0 faster and with less pain.

Custom Compliance Standard to Tailor-Fit Your Business Needs in Warden
We understand that every business has different compliance needs. With this feature, you don’t have to force a square peg into a round hole. You define the benchmark that matters to your organization, and let Warden monitor your cloud environment based on that custom standard. Read more below.

Custom Compliance Standard to Tailor-Fit Your Business Needs in Warden
We understand that every business has different compliance needs. With this feature, you don’t have to force a square peg into a round hole. You define the benchmark that matters to your organization, and let Warden monitor your cloud environment based on that custom standard. Read more below.

A CISO's Take On the Gartner Magic Quadrant
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider?

A CISO's Take On the Gartner Magic Quadrant
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider?

Demystifying CASB, CSPM, CWPP, and CNAPP For Your Organization's Cloud Security
The significant shift in adoption of cloud computing and the related risks that this is introducing is driving increasing interest toward controls that specialize on the unique cloud-based requirements. In this article we help you understand about these acronyms in detail and what each of them have to offer. Read more about CASB, CSPM, CWPP, and CNAPP below.

Demystifying CASB, CSPM, CWPP, and CNAPP For Your Organization's Cloud Security
The significant shift in adoption of cloud computing and the related risks that this is introducing is driving increasing interest toward controls that specialize on the unique cloud-based requirements. In this article we help you understand about these acronyms in detail and what each of them have to offer. Read more about CASB, CSPM, CWPP, and CNAPP below.

Warden IAM Asset Inventory to Discover & Flag Critical Resources in a Single Click
Gaining visibility into resources and policies is essential for a robust Cloud Security strategy. Read more on how Warden IAM Asset Inventory provides one place to easily see an aggregated view- to monitor and analyze and understand all assets across your multi-cloud setup.

Warden IAM Asset Inventory to Discover & Flag Critical Resources in a Single Click
Gaining visibility into resources and policies is essential for a robust Cloud Security strategy. Read more on how Warden IAM Asset Inventory provides one place to easily see an aggregated view- to monitor and analyze and understand all assets across your multi-cloud setup.

Threat Detection for Dummies
Getting breached is a nightmare, and organizations that prioritize cloud security put smart people and tools to work 24/7 as a defensive barrier against malicious attackers. But security is an ongoing process—not a guarantee. What can you do then? You can build your knowledge base and your security arsenal with the right tools and an effective strategy for threat detection and response. Learn more below.

Threat Detection for Dummies
Getting breached is a nightmare, and organizations that prioritize cloud security put smart people and tools to work 24/7 as a defensive barrier against malicious attackers. But security is an ongoing process—not a guarantee. What can you do then? You can build your knowledge base and your security arsenal with the right tools and an effective strategy for threat detection and response. Learn more below.

Top 5 Qualities For Succeeding In Tomorrow's Cybersecurity Industry
Surprise, surprise! A passion for cybersecurity is not even on the list of top 5 qualities for success in tomorrow's cybersecurity industry. Find out what employers are actually looking for today from Emil Tan, COO at Red Alpha and Founder of Infosec In The City.

Top 5 Qualities For Succeeding In Tomorrow's Cybersecurity Industry
Surprise, surprise! A passion for cybersecurity is not even on the list of top 5 qualities for success in tomorrow's cybersecurity industry. Find out what employers are actually looking for today from Emil Tan, COO at Red Alpha and Founder of Infosec In The City.

Get Notified of All Priority Alerts with AWS SNS Integration on Warden
Your security team might be using multiple channels to communicate and flag findings that your cloud security tool, a CSPM like Warden, alerts them about. This can lead to alert fatigue, and your team might feel lost in a pool of distributed notifications. Read more below on how you can consolidate these findings to increase your team’s efficiency.

Get Notified of All Priority Alerts with AWS SNS Integration on Warden
Your security team might be using multiple channels to communicate and flag findings that your cloud security tool, a CSPM like Warden, alerts them about. This can lead to alert fatigue, and your team might feel lost in a pool of distributed notifications. Read more below on how you can consolidate these findings to increase your team’s efficiency.

How Startups Can Overcome Limitations To Secure Their Business
Startups cannot afford to make the mistake of thinking of cybersecurity as an afterthought. Having a healthy, business-enabling cybersecurity posture from day one can be a daunting task given the limited budgetary and manpower resources, but not an impossible goal. How, then, can startups achieve that?

How Startups Can Overcome Limitations To Secure Their Business
Startups cannot afford to make the mistake of thinking of cybersecurity as an afterthought. Having a healthy, business-enabling cybersecurity posture from day one can be a daunting task given the limited budgetary and manpower resources, but not an impossible goal. How, then, can startups achieve that?

Excessive Access and Control Permissions Could Raise Ransomware Risks for Southeast Organisations Amid Growing Cloud Adoption: Horangi
Horangi identified excessive access and control permissions as a key cybersecurity risk amid the region’s move to cloud. Left unaddressed, this could raise the likelihood of compromised credentials, enabling threat actors to access the organisation’s network and set the stage for a ransomware attack.

Excessive Access and Control Permissions Could Raise Ransomware Risks for Southeast Organisations Amid Growing Cloud Adoption: Horangi
Horangi identified excessive access and control permissions as a key cybersecurity risk amid the region’s move to cloud. Left unaddressed, this could raise the likelihood of compromised credentials, enabling threat actors to access the organisation’s network and set the stage for a ransomware attack.

Advantages of Moving to the Cloud and Predictions on the Future of Banking
Having to sync and migrate the IT infrastructures from two different entities to the cloud is no easy task. In this episode of the podcast, find out how Ned Lowe and Singlife with Aviva succeeded in doing that and how the cloud has been a business enabler for the insurer.

Advantages of Moving to the Cloud and Predictions on the Future of Banking
Having to sync and migrate the IT infrastructures from two different entities to the cloud is no easy task. In this episode of the podcast, find out how Ned Lowe and Singlife with Aviva succeeded in doing that and how the cloud has been a business enabler for the insurer.

Using Warden IAM, Jumpcloud, BambooHR for Smooth Onboarding
The risk of account takeovers and credential compromise in the proliferation of human and machine identities today is clear as day. How much visbility is enough for security teams in order to properly manage these risks even as employees continuously onboard and offboard? Tune in to the conversation around access control security automation with Gill Langston, Senior Product Manager, MSP at JumpCloud.

Using Warden IAM, Jumpcloud, BambooHR for Smooth Onboarding
The risk of account takeovers and credential compromise in the proliferation of human and machine identities today is clear as day. How much visbility is enough for security teams in order to properly manage these risks even as employees continuously onboard and offboard? Tune in to the conversation around access control security automation with Gill Langston, Senior Product Manager, MSP at JumpCloud.

Debunking Cloud Migration and Security Myths with Horangi
Despite security being a key benefit of cloud adoption, we’ve ended up with a lack of confidence in managing threats, and increasing cybersecurity incidents. While talent shortage and team misalignment have prevented companies from making the journey to the cloud, there is another key barrier to cloud migration- security. Read more below.

Debunking Cloud Migration and Security Myths with Horangi
Despite security being a key benefit of cloud adoption, we’ve ended up with a lack of confidence in managing threats, and increasing cybersecurity incidents. While talent shortage and team misalignment have prevented companies from making the journey to the cloud, there is another key barrier to cloud migration- security. Read more below.

Start Rightsizing Your Excessive Permissions Today with Warden IAM
In a dynamic business setup, managing a large number of privileged users with access to an ever-expanding set of identities and permissions is challenging. Managing separate IAM roles and groups for these users and resources adds yet another layer of complexity. Here's how you can enforce PoLP with ease. Read more!

Start Rightsizing Your Excessive Permissions Today with Warden IAM
In a dynamic business setup, managing a large number of privileged users with access to an ever-expanding set of identities and permissions is challenging. Managing separate IAM roles and groups for these users and resources adds yet another layer of complexity. Here's how you can enforce PoLP with ease. Read more!

Horangi Continues to Spearhead Cybersecurity as Asia's Cloud Security Leader
Recently, Paul Hadjy, CEO & Co-founder of Horangi was interviewed by CyberNews. Read below as he shares insights on emerging cybersecurity tends, evolving cloud security market in Asia and beyond, and what the future holds for Horangi.

Horangi Continues to Spearhead Cybersecurity as Asia's Cloud Security Leader
Recently, Paul Hadjy, CEO & Co-founder of Horangi was interviewed by CyberNews. Read below as he shares insights on emerging cybersecurity tends, evolving cloud security market in Asia and beyond, and what the future holds for Horangi.

S3 Bucket Permissions and IAM Audits
Data is the most valuable resource in the world and more prized than oil, The Economist declared in 2017. Today, at least 97% of organizations use data to power their business opportunities, and we are accumulating data at a rate never before seen in history. The big question then is how do we secure and ensure that we can make optimal use of all this data?

S3 Bucket Permissions and IAM Audits
Data is the most valuable resource in the world and more prized than oil, The Economist declared in 2017. Today, at least 97% of organizations use data to power their business opportunities, and we are accumulating data at a rate never before seen in history. The big question then is how do we secure and ensure that we can make optimal use of all this data?

Killware: Malware That's Lethal
Ransomware incidents are headlining news and trade publications with increasing frequency so you’ll be familiar with it, but have you heard of killware?

Killware: Malware That's Lethal
Ransomware incidents are headlining news and trade publications with increasing frequency so you’ll be familiar with it, but have you heard of killware?

4 Ways To Protect Your Organization From Increasing Insider Threats And Ransomware
In its 2021 Ransomware Study, IDC reported that approximately 37% of 791 global organizations surveyed were victims of some form of a ransomware attack in 2021. That is already unsettling, but here’s the other thing: ransomware attacks are also becoming increasingly sophisticated.

4 Ways To Protect Your Organization From Increasing Insider Threats And Ransomware
In its 2021 Ransomware Study, IDC reported that approximately 37% of 791 global organizations surveyed were victims of some form of a ransomware attack in 2021. That is already unsettling, but here’s the other thing: ransomware attacks are also becoming increasingly sophisticated.

Women in Cybersecurity, and Support for Cybersecurity Entrepreneurship in Asia
More women are needed in cybersecurity, but where are the opportunities? To celebrate International Women's Day, we are honored to have Linda Schindler, Programme Head at ICE71, the region's first cybersecurity entrepreneur hub, join us on the Ask A CISO podcast.

Women in Cybersecurity, and Support for Cybersecurity Entrepreneurship in Asia
More women are needed in cybersecurity, but where are the opportunities? To celebrate International Women's Day, we are honored to have Linda Schindler, Programme Head at ICE71, the region's first cybersecurity entrepreneur hub, join us on the Ask A CISO podcast.

Shocking Cybersecurity War Stories And The Lessons We Can Learn From Them
The old adage that those who don't learn from history are doomed to repeat it rings very true in cybersecurity too. The mistakes that others made serve as some of the best lessons you can learn from, and often function as reminders not to commit the same blunders.

Shocking Cybersecurity War Stories And The Lessons We Can Learn From Them
The old adage that those who don't learn from history are doomed to repeat it rings very true in cybersecurity too. The mistakes that others made serve as some of the best lessons you can learn from, and often function as reminders not to commit the same blunders.

Advanced Threat Detection with UEBA & Anomaly Detection in Warden
Hackers are becoming more sophisticated and with the number of breaches on the rise, we have seen quite clearly that the old ways of doing things aren’t working. Traditional detection methods are not enough for catching all possible cyber attacks. Read more on how Warden Threat Detection uses UEBA to detect these anomalous activities in your cloud infrastructure before it compromises your entire system.

Advanced Threat Detection with UEBA & Anomaly Detection in Warden
Hackers are becoming more sophisticated and with the number of breaches on the rise, we have seen quite clearly that the old ways of doing things aren’t working. Traditional detection methods are not enough for catching all possible cyber attacks. Read more on how Warden Threat Detection uses UEBA to detect these anomalous activities in your cloud infrastructure before it compromises your entire system.

Respond Faster With Warden's New Threat Alert Summary
If you are in charge of cloud security or an engineer who is responsible for infrastructure security, you can easily monitor suspicious activities in your infrastructure. You can get alerted in real-time to investigate and respond to the flagged alerts that look suspicious. Learn how Warden’s Threat Detection can make it easier for you to monitor and protect your cloud stack.

Respond Faster With Warden's New Threat Alert Summary
If you are in charge of cloud security or an engineer who is responsible for infrastructure security, you can easily monitor suspicious activities in your infrastructure. You can get alerted in real-time to investigate and respond to the flagged alerts that look suspicious. Learn how Warden’s Threat Detection can make it easier for you to monitor and protect your cloud stack.

The Evolution of Ransomware, How Ransomware Gangs Work, And How You Can Prevent An Attack
Greg Edwards, the CEO of CryptoStopper, walks us through the history of ransomware, what accelerated the use of ransomware by cybercriminals, how Ransomware-as-a-Service and ransomware gangs work, and how you can protect yourself and your organization from an attack.

The Evolution of Ransomware, How Ransomware Gangs Work, And How You Can Prevent An Attack
Greg Edwards, the CEO of CryptoStopper, walks us through the history of ransomware, what accelerated the use of ransomware by cybercriminals, how Ransomware-as-a-Service and ransomware gangs work, and how you can protect yourself and your organization from an attack.

Log4j2 Vulnerability: Horangi Is Here To Help With New And Updated Warden Rules
Automate Log4j2 Vulnerability Checks and Reduce Chances of Log4j2 Exploits with New and Updated Rules on Warden While You Apply Patches and Install Updates

Log4j2 Vulnerability: Horangi Is Here To Help With New And Updated Warden Rules
Automate Log4j2 Vulnerability Checks and Reduce Chances of Log4j2 Exploits with New and Updated Rules on Warden While You Apply Patches and Install Updates

Here's The Quick Fix For The Pwnkit Vulnerability (CVE-2021-4034) On Ubuntu
Don’t Be Pwned. Before hackers exploit it on your systems or a third party supplier’s system, learn more about the latest Pwnkit local privilege escalation vulnerability (CVE 2021-4034) and what you can do to remove it on Ubuntu.

Here's The Quick Fix For The Pwnkit Vulnerability (CVE-2021-4034) On Ubuntu
Don’t Be Pwned. Before hackers exploit it on your systems or a third party supplier’s system, learn more about the latest Pwnkit local privilege escalation vulnerability (CVE 2021-4034) and what you can do to remove it on Ubuntu.
Explore:
Featured List
What Is PCI DSS 4.0 And How To Make Your Compliance Journey Easier?
Time is of the essence when you have just about two years to comply with the new PCI DSS 4.0 standard by 21 March 2024. Whether you are starting from scratch or updating your compliance from the current PCI DSS v3.2.1, read on to find out how your organization can use Warden's Compliance Automation to comply with PCI DSS v4.0 faster and with less pain.

What Is PCI DSS 4.0 And How To Make Your Compliance Journey Easier?
Time is of the essence when you have just about two years to comply with the new PCI DSS 4.0 standard by 21 March 2024. Whether you are starting from scratch or updating your compliance from the current PCI DSS v3.2.1, read on to find out how your organization can use Warden's Compliance Automation to comply with PCI DSS v4.0 faster and with less pain.

Custom Compliance Standard to Tailor-Fit Your Business Needs in Warden
We understand that every business has different compliance needs. With this feature, you don’t have to force a square peg into a round hole. You define the benchmark that matters to your organization, and let Warden monitor your cloud environment based on that custom standard. Read more below.

Custom Compliance Standard to Tailor-Fit Your Business Needs in Warden
We understand that every business has different compliance needs. With this feature, you don’t have to force a square peg into a round hole. You define the benchmark that matters to your organization, and let Warden monitor your cloud environment based on that custom standard. Read more below.

A CISO's Take On the Gartner Magic Quadrant
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider?

A CISO's Take On the Gartner Magic Quadrant
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider?

Demystifying CASB, CSPM, CWPP, and CNAPP For Your Organization's Cloud Security
The significant shift in adoption of cloud computing and the related risks that this is introducing is driving increasing interest toward controls that specialize on the unique cloud-based requirements. In this article we help you understand about these acronyms in detail and what each of them have to offer. Read more about CASB, CSPM, CWPP, and CNAPP below.

Demystifying CASB, CSPM, CWPP, and CNAPP For Your Organization's Cloud Security
The significant shift in adoption of cloud computing and the related risks that this is introducing is driving increasing interest toward controls that specialize on the unique cloud-based requirements. In this article we help you understand about these acronyms in detail and what each of them have to offer. Read more about CASB, CSPM, CWPP, and CNAPP below.

Warden IAM Asset Inventory to Discover & Flag Critical Resources in a Single Click
Gaining visibility into resources and policies is essential for a robust Cloud Security strategy. Read more on how Warden IAM Asset Inventory provides one place to easily see an aggregated view- to monitor and analyze and understand all assets across your multi-cloud setup.

Warden IAM Asset Inventory to Discover & Flag Critical Resources in a Single Click
Gaining visibility into resources and policies is essential for a robust Cloud Security strategy. Read more on how Warden IAM Asset Inventory provides one place to easily see an aggregated view- to monitor and analyze and understand all assets across your multi-cloud setup.

Threat Detection for Dummies
Getting breached is a nightmare, and organizations that prioritize cloud security put smart people and tools to work 24/7 as a defensive barrier against malicious attackers. But security is an ongoing process—not a guarantee. What can you do then? You can build your knowledge base and your security arsenal with the right tools and an effective strategy for threat detection and response. Learn more below.

Threat Detection for Dummies
Getting breached is a nightmare, and organizations that prioritize cloud security put smart people and tools to work 24/7 as a defensive barrier against malicious attackers. But security is an ongoing process—not a guarantee. What can you do then? You can build your knowledge base and your security arsenal with the right tools and an effective strategy for threat detection and response. Learn more below.

Top 5 Qualities For Succeeding In Tomorrow's Cybersecurity Industry
Surprise, surprise! A passion for cybersecurity is not even on the list of top 5 qualities for success in tomorrow's cybersecurity industry. Find out what employers are actually looking for today from Emil Tan, COO at Red Alpha and Founder of Infosec In The City.

Top 5 Qualities For Succeeding In Tomorrow's Cybersecurity Industry
Surprise, surprise! A passion for cybersecurity is not even on the list of top 5 qualities for success in tomorrow's cybersecurity industry. Find out what employers are actually looking for today from Emil Tan, COO at Red Alpha and Founder of Infosec In The City.

Get Notified of All Priority Alerts with AWS SNS Integration on Warden
Your security team might be using multiple channels to communicate and flag findings that your cloud security tool, a CSPM like Warden, alerts them about. This can lead to alert fatigue, and your team might feel lost in a pool of distributed notifications. Read more below on how you can consolidate these findings to increase your team’s efficiency.

Get Notified of All Priority Alerts with AWS SNS Integration on Warden
Your security team might be using multiple channels to communicate and flag findings that your cloud security tool, a CSPM like Warden, alerts them about. This can lead to alert fatigue, and your team might feel lost in a pool of distributed notifications. Read more below on how you can consolidate these findings to increase your team’s efficiency.

How Startups Can Overcome Limitations To Secure Their Business
Startups cannot afford to make the mistake of thinking of cybersecurity as an afterthought. Having a healthy, business-enabling cybersecurity posture from day one can be a daunting task given the limited budgetary and manpower resources, but not an impossible goal. How, then, can startups achieve that?

How Startups Can Overcome Limitations To Secure Their Business
Startups cannot afford to make the mistake of thinking of cybersecurity as an afterthought. Having a healthy, business-enabling cybersecurity posture from day one can be a daunting task given the limited budgetary and manpower resources, but not an impossible goal. How, then, can startups achieve that?

Excessive Access and Control Permissions Could Raise Ransomware Risks for Southeast Organisations Amid Growing Cloud Adoption: Horangi
Horangi identified excessive access and control permissions as a key cybersecurity risk amid the region’s move to cloud. Left unaddressed, this could raise the likelihood of compromised credentials, enabling threat actors to access the organisation’s network and set the stage for a ransomware attack.

Excessive Access and Control Permissions Could Raise Ransomware Risks for Southeast Organisations Amid Growing Cloud Adoption: Horangi
Horangi identified excessive access and control permissions as a key cybersecurity risk amid the region’s move to cloud. Left unaddressed, this could raise the likelihood of compromised credentials, enabling threat actors to access the organisation’s network and set the stage for a ransomware attack.

Advantages of Moving to the Cloud and Predictions on the Future of Banking
Having to sync and migrate the IT infrastructures from two different entities to the cloud is no easy task. In this episode of the podcast, find out how Ned Lowe and Singlife with Aviva succeeded in doing that and how the cloud has been a business enabler for the insurer.

Advantages of Moving to the Cloud and Predictions on the Future of Banking
Having to sync and migrate the IT infrastructures from two different entities to the cloud is no easy task. In this episode of the podcast, find out how Ned Lowe and Singlife with Aviva succeeded in doing that and how the cloud has been a business enabler for the insurer.

Using Warden IAM, Jumpcloud, BambooHR for Smooth Onboarding
The risk of account takeovers and credential compromise in the proliferation of human and machine identities today is clear as day. How much visbility is enough for security teams in order to properly manage these risks even as employees continuously onboard and offboard? Tune in to the conversation around access control security automation with Gill Langston, Senior Product Manager, MSP at JumpCloud.

Using Warden IAM, Jumpcloud, BambooHR for Smooth Onboarding
The risk of account takeovers and credential compromise in the proliferation of human and machine identities today is clear as day. How much visbility is enough for security teams in order to properly manage these risks even as employees continuously onboard and offboard? Tune in to the conversation around access control security automation with Gill Langston, Senior Product Manager, MSP at JumpCloud.

Debunking Cloud Migration and Security Myths with Horangi
Despite security being a key benefit of cloud adoption, we’ve ended up with a lack of confidence in managing threats, and increasing cybersecurity incidents. While talent shortage and team misalignment have prevented companies from making the journey to the cloud, there is another key barrier to cloud migration- security. Read more below.

Debunking Cloud Migration and Security Myths with Horangi
Despite security being a key benefit of cloud adoption, we’ve ended up with a lack of confidence in managing threats, and increasing cybersecurity incidents. While talent shortage and team misalignment have prevented companies from making the journey to the cloud, there is another key barrier to cloud migration- security. Read more below.

Start Rightsizing Your Excessive Permissions Today with Warden IAM
In a dynamic business setup, managing a large number of privileged users with access to an ever-expanding set of identities and permissions is challenging. Managing separate IAM roles and groups for these users and resources adds yet another layer of complexity. Here's how you can enforce PoLP with ease. Read more!

Start Rightsizing Your Excessive Permissions Today with Warden IAM
In a dynamic business setup, managing a large number of privileged users with access to an ever-expanding set of identities and permissions is challenging. Managing separate IAM roles and groups for these users and resources adds yet another layer of complexity. Here's how you can enforce PoLP with ease. Read more!

Horangi Continues to Spearhead Cybersecurity as Asia's Cloud Security Leader
Recently, Paul Hadjy, CEO & Co-founder of Horangi was interviewed by CyberNews. Read below as he shares insights on emerging cybersecurity tends, evolving cloud security market in Asia and beyond, and what the future holds for Horangi.

Horangi Continues to Spearhead Cybersecurity as Asia's Cloud Security Leader
Recently, Paul Hadjy, CEO & Co-founder of Horangi was interviewed by CyberNews. Read below as he shares insights on emerging cybersecurity tends, evolving cloud security market in Asia and beyond, and what the future holds for Horangi.

S3 Bucket Permissions and IAM Audits
Data is the most valuable resource in the world and more prized than oil, The Economist declared in 2017. Today, at least 97% of organizations use data to power their business opportunities, and we are accumulating data at a rate never before seen in history. The big question then is how do we secure and ensure that we can make optimal use of all this data?

S3 Bucket Permissions and IAM Audits
Data is the most valuable resource in the world and more prized than oil, The Economist declared in 2017. Today, at least 97% of organizations use data to power their business opportunities, and we are accumulating data at a rate never before seen in history. The big question then is how do we secure and ensure that we can make optimal use of all this data?

Killware: Malware That's Lethal
Ransomware incidents are headlining news and trade publications with increasing frequency so you’ll be familiar with it, but have you heard of killware?

Killware: Malware That's Lethal
Ransomware incidents are headlining news and trade publications with increasing frequency so you’ll be familiar with it, but have you heard of killware?

4 Ways To Protect Your Organization From Increasing Insider Threats And Ransomware
In its 2021 Ransomware Study, IDC reported that approximately 37% of 791 global organizations surveyed were victims of some form of a ransomware attack in 2021. That is already unsettling, but here’s the other thing: ransomware attacks are also becoming increasingly sophisticated.

4 Ways To Protect Your Organization From Increasing Insider Threats And Ransomware
In its 2021 Ransomware Study, IDC reported that approximately 37% of 791 global organizations surveyed were victims of some form of a ransomware attack in 2021. That is already unsettling, but here’s the other thing: ransomware attacks are also becoming increasingly sophisticated.

Women in Cybersecurity, and Support for Cybersecurity Entrepreneurship in Asia
More women are needed in cybersecurity, but where are the opportunities? To celebrate International Women's Day, we are honored to have Linda Schindler, Programme Head at ICE71, the region's first cybersecurity entrepreneur hub, join us on the Ask A CISO podcast.

Women in Cybersecurity, and Support for Cybersecurity Entrepreneurship in Asia
More women are needed in cybersecurity, but where are the opportunities? To celebrate International Women's Day, we are honored to have Linda Schindler, Programme Head at ICE71, the region's first cybersecurity entrepreneur hub, join us on the Ask A CISO podcast.

Shocking Cybersecurity War Stories And The Lessons We Can Learn From Them
The old adage that those who don't learn from history are doomed to repeat it rings very true in cybersecurity too. The mistakes that others made serve as some of the best lessons you can learn from, and often function as reminders not to commit the same blunders.

Shocking Cybersecurity War Stories And The Lessons We Can Learn From Them
The old adage that those who don't learn from history are doomed to repeat it rings very true in cybersecurity too. The mistakes that others made serve as some of the best lessons you can learn from, and often function as reminders not to commit the same blunders.

Advanced Threat Detection with UEBA & Anomaly Detection in Warden
Hackers are becoming more sophisticated and with the number of breaches on the rise, we have seen quite clearly that the old ways of doing things aren’t working. Traditional detection methods are not enough for catching all possible cyber attacks. Read more on how Warden Threat Detection uses UEBA to detect these anomalous activities in your cloud infrastructure before it compromises your entire system.

Advanced Threat Detection with UEBA & Anomaly Detection in Warden
Hackers are becoming more sophisticated and with the number of breaches on the rise, we have seen quite clearly that the old ways of doing things aren’t working. Traditional detection methods are not enough for catching all possible cyber attacks. Read more on how Warden Threat Detection uses UEBA to detect these anomalous activities in your cloud infrastructure before it compromises your entire system.

Respond Faster With Warden's New Threat Alert Summary
If you are in charge of cloud security or an engineer who is responsible for infrastructure security, you can easily monitor suspicious activities in your infrastructure. You can get alerted in real-time to investigate and respond to the flagged alerts that look suspicious. Learn how Warden’s Threat Detection can make it easier for you to monitor and protect your cloud stack.

Respond Faster With Warden's New Threat Alert Summary
If you are in charge of cloud security or an engineer who is responsible for infrastructure security, you can easily monitor suspicious activities in your infrastructure. You can get alerted in real-time to investigate and respond to the flagged alerts that look suspicious. Learn how Warden’s Threat Detection can make it easier for you to monitor and protect your cloud stack.

The Evolution of Ransomware, How Ransomware Gangs Work, And How You Can Prevent An Attack
Greg Edwards, the CEO of CryptoStopper, walks us through the history of ransomware, what accelerated the use of ransomware by cybercriminals, how Ransomware-as-a-Service and ransomware gangs work, and how you can protect yourself and your organization from an attack.

The Evolution of Ransomware, How Ransomware Gangs Work, And How You Can Prevent An Attack
Greg Edwards, the CEO of CryptoStopper, walks us through the history of ransomware, what accelerated the use of ransomware by cybercriminals, how Ransomware-as-a-Service and ransomware gangs work, and how you can protect yourself and your organization from an attack.

Log4j2 Vulnerability: Horangi Is Here To Help With New And Updated Warden Rules
Automate Log4j2 Vulnerability Checks and Reduce Chances of Log4j2 Exploits with New and Updated Rules on Warden While You Apply Patches and Install Updates

Log4j2 Vulnerability: Horangi Is Here To Help With New And Updated Warden Rules
Automate Log4j2 Vulnerability Checks and Reduce Chances of Log4j2 Exploits with New and Updated Rules on Warden While You Apply Patches and Install Updates

Here's The Quick Fix For The Pwnkit Vulnerability (CVE-2021-4034) On Ubuntu
Don’t Be Pwned. Before hackers exploit it on your systems or a third party supplier’s system, learn more about the latest Pwnkit local privilege escalation vulnerability (CVE 2021-4034) and what you can do to remove it on Ubuntu.

Here's The Quick Fix For The Pwnkit Vulnerability (CVE-2021-4034) On Ubuntu
Don’t Be Pwned. Before hackers exploit it on your systems or a third party supplier’s system, learn more about the latest Pwnkit local privilege escalation vulnerability (CVE 2021-4034) and what you can do to remove it on Ubuntu.


Southeast Asian Cybersecurity Startup Horangi Is The First To Offer Compliance Automation For Huawei Cloud
Horangi now provides compliance automation for the Huawei Cloud Security Configuration, allowing customers of Huawei Cloud to check their compliance posture against the latest security best practices.

Southeast Asian Cybersecurity Startup Horangi Is The First To Offer Compliance Automation For Huawei Cloud
Horangi now provides compliance automation for the Huawei Cloud Security Configuration, allowing customers of Huawei Cloud to check their compliance posture against the latest security best practices.
Explore:
Featured List

What Is PCI DSS 4.0 And How To Make Your Compliance Journey Easier?
Time is of the essence when you have just about two years to comply with the new PCI DSS 4.0 standard by 21 March 2024. Whether you are starting from scratch or updating your compliance from the current PCI DSS v3.2.1, read on to find out how your organization can use Warden's Compliance Automation to comply with PCI DSS v4.0 faster and with less pain.

What Is PCI DSS 4.0 And How To Make Your Compliance Journey Easier?
Time is of the essence when you have just about two years to comply with the new PCI DSS 4.0 standard by 21 March 2024. Whether you are starting from scratch or updating your compliance from the current PCI DSS v3.2.1, read on to find out how your organization can use Warden's Compliance Automation to comply with PCI DSS v4.0 faster and with less pain.

Custom Compliance Standard to Tailor-Fit Your Business Needs in Warden
We understand that every business has different compliance needs. With this feature, you don’t have to force a square peg into a round hole. You define the benchmark that matters to your organization, and let Warden monitor your cloud environment based on that custom standard. Read more below.

Custom Compliance Standard to Tailor-Fit Your Business Needs in Warden
We understand that every business has different compliance needs. With this feature, you don’t have to force a square peg into a round hole. You define the benchmark that matters to your organization, and let Warden monitor your cloud environment based on that custom standard. Read more below.

A CISO's Take On the Gartner Magic Quadrant
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider?

A CISO's Take On the Gartner Magic Quadrant
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider?

Demystifying CASB, CSPM, CWPP, and CNAPP For Your Organization's Cloud Security
The significant shift in adoption of cloud computing and the related risks that this is introducing is driving increasing interest toward controls that specialize on the unique cloud-based requirements. In this article we help you understand about these acronyms in detail and what each of them have to offer. Read more about CASB, CSPM, CWPP, and CNAPP below.

Demystifying CASB, CSPM, CWPP, and CNAPP For Your Organization's Cloud Security
The significant shift in adoption of cloud computing and the related risks that this is introducing is driving increasing interest toward controls that specialize on the unique cloud-based requirements. In this article we help you understand about these acronyms in detail and what each of them have to offer. Read more about CASB, CSPM, CWPP, and CNAPP below.

Warden IAM Asset Inventory to Discover & Flag Critical Resources in a Single Click
Gaining visibility into resources and policies is essential for a robust Cloud Security strategy. Read more on how Warden IAM Asset Inventory provides one place to easily see an aggregated view- to monitor and analyze and understand all assets across your multi-cloud setup.

Warden IAM Asset Inventory to Discover & Flag Critical Resources in a Single Click
Gaining visibility into resources and policies is essential for a robust Cloud Security strategy. Read more on how Warden IAM Asset Inventory provides one place to easily see an aggregated view- to monitor and analyze and understand all assets across your multi-cloud setup.