
- Case Study
Accelerating Remediation of Cloud Security Risks with Lightspin
Discover how Imperva reduced noise by 91% in their cloud environments, significantly alleviating alert fatigue and improving their team’s efficiency.
Discover how Imperva reduced noise by 91% in their cloud environments, significantly alleviating alert fatigue and improving their team’s efficiency.
In this webinar, Lightspin experts discuss hot topics and tips for leveling up your Kubernetes security knowledge.
In this webinar, we discuss graphs in threat-centric / people-centric security programs, supply chain risks, asset management, third-party risk and ...
Find out how a global leader in transportation maximized productivity by prioritizing their cloud security risks with Lightspin.
Learn why context is the best solution to cloud security risks and vulnerabilities, whether it's a CVE, a cloud misconfiguration, or a permission ...
In this webinar, we discuss the challenges with today’s CNAPP and CSPM solutions and Lightspin’s Graph-Based CNAPP approach to overcoming them.
Discover how Imperva reduced noise by 91% in their cloud environments, significantly alleviating alert fatigue and improving their team’s efficiency.
Discover all of your AWS cloud subdomains to see where your environment could potentially have vulnerabilities that attackers may exploit.
In this webinar, Lightspin experts discuss hot topics and tips for leveling up your Kubernetes security knowledge.
Use Lightspin's EKS Creation Engine (ECE) to facilitate the creation and enablement of secure EKS Clusters.
Leverage predictive attack path analysis and keep attackers out of your environment
In this webinar, we discuss the challenges with today’s CNAPP and CSPM solutions and Lightspin’s Graph-Based CNAPP approach to overcoming them.
Discover how Imperva reduced noise by 91% in their cloud environments, significantly alleviating alert fatigue and improving their team’s efficiency.
Discover all of your AWS cloud subdomains to see where your environment could potentially have vulnerabilities that attackers may exploit.
In this webinar, Lightspin experts discuss hot topics and tips for leveling up your Kubernetes security knowledge.
Use Lightspin's EKS Creation Engine (ECE) to facilitate the creation and enablement of secure EKS Clusters.
Lightspin’s multi-layer cloud security platform provides maximum security value, with minimal effort required.
In this webinar, we discuss graphs in threat-centric / people-centric security programs, supply chain risks, asset management, third-party risk and ...
Use Lightspin's S3 Bucket Scanner to scan your S3 Buckets for public access and cross-account attacks.
Lightspin CEO, Vladi Sandler, discusses the optimal approach for CISOs when considering the most effective security solution for their organization.
Check out this webinar to get an informative and technical overview of Kubernetes technologies from cloud security experts.
Find out how a global leader in transportation maximized productivity by prioritizing their cloud security risks with Lightspin.
Companies continuously accelerate their transformation to the cloud and additional advanced cloud technologies, but these processes have consequences.
Lightspin AWS IAM vulnerability scanner can detect misconfigurations in different IAM objects.
Learn how to scan and audit your EC2 instance to find its vulnerabilities, security misconfigurations and signs of a rootkit.
Red team cheat sheet based on kubectl commands enables the right point of view for your Kubernetes Security Posture from the attacker's perspective.
Learn how to identify orphan assets, configurations, permissions, and native services, to avoid an increased risk of data breach.
Kubernetes is highly popular yet misconfiguring it is the #1 vulnerability every cloud-based organization should be protected from. Learn how to do ...
Container security in Kubernetes webinar covering pod security policy and privileged containers as well as container security in general.
Watch our container security in Kubernetes webinar and workshop to learn about pod security policy, privileged containers and Kubernetes.
Learn about Kubernetes security best practices, from Kubernetes architecture to authentication and authorization, secrets management and network ...
Having too many alerts resulting from first-generation cloud security solutions makes alert prioritization a difficult task to complete.
Detecting Multiple EC2 Instances Using the Same SSH Key Pair to Prevent Hacks
Learn why context is the best solution to cloud security risks and vulnerabilities, whether it's a CVE, a cloud misconfiguration, or a permission ...
© 2022 Lightspin