Aporeto Logo
Aporeto Logo

How to Combat Cloud Hacking

Cloud hacking is a major problem. In 2018, cybercrime cost the global economy ...

Written By: Amir Sharif
May 23
arrow

Application-aware Security, Part 3: Authentication ...

In the last part of this blog series, we expand upon our previous discussion of ...

Written By: Amir Sharif
May 20
arrow

Microservices and DevOps | Part I: Running Faster

There is a general truth about better competitors.  This truth applies at any ...

Written By: Amir Sharif
Jun 26
arrow

Surviving the Zombie Apocalypse, AKA Software Security ...

Take a look at our article in the Cloud Computing Journal this week providing ...

Written By: Stefano
Jun 07
arrow

The Quest for Segmentation

One of the most widely deployed security practices is “segmentation”, or ...

Written By: Dimitri Stiliadis
Jun 01
arrow

A Quest For Trust

It has been a common wisdom that good security depends on a solid wall.  That ...

Written By: Dimitri Stiliadis
May 06
arrow
x