NEW PRODUCT RELEASE:

DNS Posture Management (DNSPM)

  • Login
  • Contact Us
CheckRed Security logo
  • Home
  • Platform
        • SSPMProtect your SaaS applications from security risks
        • DNSPMFull visibility & control over all DNS providers
        • CSPMDetect security misconfigurations in your cloud
        • CIEMSafeguard your cloud identities and entitlements
        • Continuous ComplianceAchieve regulatory compliance with custom frameworks
        • IntegrationsImprove collaboration with our integration capabilities
        • CWPPProtect all layers of your cloud workloads
        • CNAPPSecure 100% of your cloud with a single platform
        • KSPMSecure all your Kubernetes clusters
        • ADPMDetect Active Directory vulnerabilities
        • Identity SecurityGovern all identities – human & non-human
  • Solutions
        • SaaS Apps

        • Microsoft 365
        • Salesforce
        • ServiceNow
        • Okta
        • Other Supported Apps
        • Cloud Apps

        • Amazon Web Services
        • Microsoft Azure
        • Google Cloud
        • Akamai Linode
        • Multi-cloud
  • Use Cases
        • By Capability

        • 360° Asset Visibility
        • Misconfiguration Assessment
        • Identity and Access Management (IAM)
        • 3rd Party App Management
        • Alert Prioritization
        • Guided Remediation
        • Continuous Compliance Assessment
        • By Industry

        • Finance
        • Healthcare
        • MSSP
        • Technology
        • Other
        • By Role

        • CISO
        • CIO
        • CTO
        • Analysts
  • Resources
    • Blog
    • White Papers
    • Use Cases
    • Case Studies
    • Datasheets
    • In The News
  • Company
    • About Us
    • Testimonials
    • Careers
    • Contact Us
    • Partner login
  • Partners
  • Get a Demo
  • Login
  • Contact Us

Blog

Back To All Resources
The U.S. Treasury Hack: A Wake-up Call for Implementing Strong Identity Access Management

The U.S. Treasury Hack: A Wake-up Call for Implementing Strong Identity Access Management

Jan 13, 2025

The recent cyberattack on the U.S. Treasury, confirmed on December 30, 2024, has brought to light the critical need for...

read more
2024 in SaaS Breaches – A Recap

2024 in SaaS Breaches – A Recap

Dec 23, 2024

Throughout 2024, the Software as a Service (SaaS) landscape saw significant growth, with businesses increasingly relying on...

read more
Securing Healthcare in the Cloud: Key Insights from the Liverpool Cyberattack

Securing Healthcare in the Cloud: Key Insights from the Liverpool Cyberattack

Dec 16, 2024

As SaaS apps and cloud services become central to healthcare operations, security vulnerabilities also increase. An...

read more
Defending Against Advanced Identity-Based Attacks

Defending Against Advanced Identity-Based Attacks

Dec 9, 2024

Identity-based attacks have become more sophisticated and prevalent as organizations adopt stronger authentication methods...

read more
Understanding CMMC 2.0 – A Guide for MSPs and MSSPs

Understanding CMMC 2.0 – A Guide for MSPs and MSSPs

Dec 2, 2024

As an MSP or MSSP, helping your clients navigate the complexities of cybersecurity is a critical part of your...

read more
EmeraldWhale – Major Cyberattack Involving 15,000 Cloud Credentials and Exposed GitHub Configurations

EmeraldWhale – Major Cyberattack Involving 15,000 Cloud Credentials and Exposed GitHub Configurations

Nov 25, 2024

A major cyberattack occurred just a few weeks ago, and is quite the serious wake-up call for organizations using cloud...

read more
Misleading Disclosures About Cyberattacks Can Cost You Millions!

Misleading Disclosures About Cyberattacks Can Cost You Millions!

Nov 18, 2024

The Securities and Exchange Commission has charged four prominent companies—Unisys Corp., Avaya Holdings, Check Point...

read more
Google Cloud Update – Mandatory Multi-factor Authentication (MFA) by 2025

Google Cloud Update – Mandatory Multi-factor Authentication (MFA) by 2025

Nov 11, 2024

In a move to bolster security and protect against rising cyber threats, Google is making Multi-factor Authentication (MFA)...

read more
Three Kubernetes Security Incidents in 2024

Three Kubernetes Security Incidents in 2024

Oct 15, 2024

Kubernetes, or K8s, has become a key technology for managing containerized applications, providing organizations with...

read more
Page 3 of 13← Prev12345...Next →Last Page
CheckRed Security logo

Inspect misconfigurations. Meet compliance requirements. Analyze risks.
An all-in-one platform for cloud, SaaS and DNS security!

Follow us on

  • Platforms
    • SSPM
    • DNSPM
    • CSPM
    • CIEM
    • CWPP
    • CNAPP
    • Continuous Compliance
    • Integrations
  • SaaS Security
    • Microsoft 365
    • Salesforce
    • ServiceNow
    • Okta
    • Other Supported Apps
  • Cloud Security
    • Amazon Web Services (AWS)
    • Microsoft Azure
    • Google Cloud
    • Akamai Linode
    • Multi-cloud
  • Company
    • About Us
    • Careers
    • Contact Us
    • Resources
    • Support
Top Infosec Awards certification logo
Top Infosec Awards
SOC 2 Compliant certification logo
SOC 2 Compliant
 ISO 27001 Certified certification logo
ISO 27001 Certified
 CSA Member
CSA Member
© 2025 CheckRed. All Rights Reserved.
  • Privacy Policy