NEW PRODUCT RELEASE:

DNS Posture Management (DNSPM)

  • Login
  • Contact Us
CheckRed Security logo
  • Home
  • Platform
        • SSPMProtect your SaaS applications from security risks
        • DNSPMFull visibility & control over all DNS providers
        • CSPMDetect security misconfigurations in your cloud
        • CIEMSafeguard your cloud identities and entitlements
        • Continuous ComplianceAchieve regulatory compliance with custom frameworks
        • IntegrationsImprove collaboration with our integration capabilities
        • CWPPProtect all layers of your cloud workloads
        • CNAPPSecure 100% of your cloud with a single platform
        • KSPMSecure all your Kubernetes clusters
        • ADPMDetect Active Directory vulnerabilities
        • Identity SecurityGovern all identities – human & non-human
  • Solutions
        • SaaS Apps

        • Microsoft 365
        • Salesforce
        • ServiceNow
        • Okta
        • Other Supported Apps
        • Cloud Apps

        • Amazon Web Services
        • Microsoft Azure
        • Google Cloud
        • Akamai Linode
        • Multi-cloud
  • Use Cases
        • By Capability

        • 360° Asset Visibility
        • Misconfiguration Assessment
        • Identity and Access Management (IAM)
        • 3rd Party App Management
        • Alert Prioritization
        • Guided Remediation
        • Continuous Compliance Assessment
        • By Industry

        • Finance
        • Healthcare
        • MSSP
        • Technology
        • Other
        • By Role

        • CISO
        • CIO
        • CTO
        • Analysts
  • Resources
    • Blog
    • White Papers
    • Use Cases
    • Case Studies
    • Datasheets
    • In The News
  • Company
    • About Us
    • Testimonials
    • Careers
    • Contact Us
    • Partner login
  • Partners
  • Get a Demo
  • Login
  • Contact Us

Blog

Back To All Resources
The Hidden Risk in Your Cloud Stack: How Overlooked AWS Resources Become Entry Points for Hackers

The Hidden Risk in Your Cloud Stack: How Overlooked AWS Resources Become Entry Points for Hackers

Mar 11, 2025

In February, Angel One, one of India’s leading financial services platforms, disclosed a security breach stemming from...

read more
CISA’s New Microsoft 365 Security Mandate: What You Need to Know

CISA’s New Microsoft 365 Security Mandate: What You Need to Know

Feb 18, 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new directive in December 2024, the Binding...

read more
Cloud and SaaS Security in Critical Infrastructure: Lessons from Recent Attacks

Cloud and SaaS Security in Critical Infrastructure: Lessons from Recent Attacks

Feb 11, 2025

Cyberattacks on critical infrastructure have become a growing concern, with sectors like water supply, energy, and other...

read more
What Companies Can Learn from New York’s Data Breach Fines: Lessons from PayPal, Geico, and Travelers

What Companies Can Learn from New York’s Data Breach Fines: Lessons from PayPal, Geico, and Travelers

Feb 4, 2025

As cyber threats continue to escalate, regulatory bodies are cracking down on companies that fail to protect customer data....

read more
The Changing Face of Healthcare Cybersecurity: Updates to the HIPAA Security Rule

The Changing Face of Healthcare Cybersecurity: Updates to the HIPAA Security Rule

Jan 27, 2025

The healthcare industry is facing an unprecedented rise in cyberattacks, with breaches becoming increasingly frequent and...

read more
Volkswagen Data Breach: A Lesson in AWS Cloud Security

Volkswagen Data Breach: A Lesson in AWS Cloud Security

Jan 24, 2025

A recent data breach involving Volkswagen’s brands—Volkswagen, Audi, Seat, and Skoda—has exposed the sensitive personal...

read more
Lessons from the Cisco Data Breach: Preventing Misconfigurations

Lessons from the Cisco Data Breach: Preventing Misconfigurations

Jan 20, 2025

On December 16, 2024, a hacker named "IntelBroker" leaked 2.9 gigabytes of data from Cisco's DevHub platform onto...

read more
The U.S. Treasury Hack: A Wake-up Call for Implementing Strong Identity Access Management

The U.S. Treasury Hack: A Wake-up Call for Implementing Strong Identity Access Management

Jan 13, 2025

The recent cyberattack on the U.S. Treasury, confirmed on December 30, 2024, has brought to light the critical need for...

read more
2024 in SaaS Breaches – A Recap

2024 in SaaS Breaches – A Recap

Dec 23, 2024

Throughout 2024, the Software as a Service (SaaS) landscape saw significant growth, with businesses increasingly relying on...

read more
Page 3 of 14← Prev12345...Next →Last Page
CheckRed Security logo

Inspect misconfigurations. Meet compliance requirements. Analyze risks.
An all-in-one platform for cloud, SaaS and DNS security!

Follow us on

  • Platforms
    • SSPM
    • DNSPM
    • CSPM
    • CIEM
    • CWPP
    • CNAPP
    • Continuous Compliance
    • Integrations
  • SaaS Security
    • Microsoft 365
    • Salesforce
    • ServiceNow
    • Okta
    • Other Supported Apps
  • Cloud Security
    • Amazon Web Services (AWS)
    • Microsoft Azure
    • Google Cloud
    • Akamai Linode
    • Multi-cloud
  • Company
    • About Us
    • Careers
    • Contact Us
    • Resources
    • Support
Top Infosec Awards certification logo
Top Infosec Awards
SOC 2 Compliant certification logo
SOC 2 Compliant
 ISO 27001 Certified certification logo
ISO 27001 Certified
 CSA Member
CSA Member
 CSA Member
Star Level 1
© 2025 CheckRed. All Rights Reserved.
  • Privacy Policy