Posts tagged Research

Security Operations
CIEM is Required for Cloud Security and IAM Providers to Compete: Gartner® Report

Threat Research
New Research: Optimizing DAST Vulnerability Triage with Deep Learning

Products and Tools
Are Your Apps Exposed? Know Faster With Application Discovery in InsightAppSec
![[Infographic] Cloud Misconfigurations: Don't Become a Breach Statistic](https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta641c486e6c84740/683ddca63323a52caa80a7a7/miconfigurations-infographic-clip2.jpg?auto=avif)
Threat Research
[Infographic] Cloud Misconfigurations: Don't Become a Breach Statistic

Threat Research
2022 Cloud Misconfigurations Report: Cloud Security Breaches and Attack Trends

Exposure Management
Cloud Pentesting, Pt. 3: The Impact of Ecosystem Maturity

Exposure Management
Cloud Pentesting, Pt. 2: Testing Across Different Deployments

Exposure Management
Cloud Pentesting, Pt. 1: Breaking Down the Basics

Threat Research