SECURITY ALERT:

Entra ID flaw exposed identity gaps—see what it revealed

  • Login
  • Contact Us
CheckRed Security logo
  • Home
  • Platform
        • SSPMProtect your SaaS applications from security risks
        • DNSPMFull visibility & control over all DNS providers
        • CSPMDetect security misconfigurations in your cloud
        • CIEMSafeguard your cloud identities and entitlements
        • Continuous ComplianceAchieve regulatory compliance with custom frameworks
        • IntegrationsImprove collaboration with our integration capabilities
        • CWPPProtect all layers of your cloud workloads
        • CNAPPSecure 100% of your cloud with a single platform
        • KSPMSecure all your Kubernetes clusters
        • ADPMDetect Active Directory vulnerabilities
        • Identity PostureGovern all identities – human & non-human
        • ITDRReal-time SaaS identity threat detection & response
  • Solutions
        • SaaS Apps

        • Microsoft 365
        • Salesforce
        • ServiceNow
        • Okta
        • Other Supported Apps
        • Cloud Apps

        • Amazon Web Services
        • Microsoft Azure
        • Google Cloud
        • Akamai Linode
        • Multi-cloud
  • Use Cases
        • By Capability

        • 360° Asset Visibility
        • Misconfiguration Assessment
        • Identity and Access Management (IAM)
        • 3rd Party App Management
        • Alert Prioritization
        • Guided Remediation
        • Continuous Compliance Assessment
        • By Industry

        • Finance
        • Healthcare
        • MSSP
        • Technology
        • Other
        • By Role

        • CISO
        • CIO
        • CTO
        • Analysts
  • Resources
    • Blog
    • White Papers
    • Use Cases
    • Case Studies
    • Datasheets
    • In The News
  • Company
    • About Us
    • Testimonials
    • Careers
    • Contact Us
    • Partner Login
  • Partners
  • Get a Demo
  • Login
  • Contact Us

CSPM

Back To All Resources
The Hidden Risk in Your Cloud Stack: How Overlooked AWS Resources Become Entry Points for Hackers

The Hidden Risk in Your Cloud Stack: How Overlooked AWS Resources Become Entry Points for Hackers

Mar 11, 2025

In February, Angel One, one of India’s leading financial services platforms, disclosed a security breach stemming from...

read more
EmeraldWhale – Major Cyberattack Involving 15,000 Cloud Credentials and Exposed GitHub Configurations

EmeraldWhale – Major Cyberattack Involving 15,000 Cloud Credentials and Exposed GitHub Configurations

Nov 25, 2024

A major cyberattack occurred just a few weeks ago, and is quite the serious wake-up call for organizations using cloud...

read more
Understanding the Latest Analysis of FY23 Risk and Vulnerability Assessments from the CISA

Understanding the Latest Analysis of FY23 Risk and Vulnerability Assessments from the CISA

Oct 8, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) conducts Risk and Vulnerability Assessments (RVAs) for federal...

read more
Best Practices for Non-Human Identity Security When Offboarding Employees

Best Practices for Non-Human Identity Security When Offboarding Employees

Sep 25, 2024

When an employee leaves or transitions to a new role, it’s easy to focus on the HR aspects of offboarding. However, the...

read more
Microsoft Strengthens Azure Cloud Security with Mandatory MFA

Microsoft Strengthens Azure Cloud Security with Mandatory MFA

Sep 18, 2024

Microsoft has announced that multi-factor authentication (MFA) will soon be mandatory for all Azure sign-ins to bolster...

read more
Understanding the Threat: Attackers Exploiting Native Microsoft Cloud Services

Understanding the Threat: Attackers Exploiting Native Microsoft Cloud Services

Sep 11, 2024

Cloud security is facing significant threats as attackers increasingly exploit native Microsoft services, including...

read more
Complete Cloud Security for Finance: Protect Your Organization’s Future

Complete Cloud Security for Finance: Protect Your Organization’s Future

Jul 18, 2024

Complete Cloud Security for Finance: Protect Your Organization’s FutureOrganizations in the finance sector are among the...

read more
Complete Cloud Security in Healthcare: Prevention is Better Than Cure

Complete Cloud Security in Healthcare: Prevention is Better Than Cure

Jul 18, 2024

Complete Cloud Security in Healthcare: Prevention is Better Than CureHealthcare organizations often hold an enormous...

read more
Enhancing Cloud Security with MITRE ATT&CK: A Deep Dive into CheckRed’s Advanced Dashboard

Enhancing Cloud Security with MITRE ATT&CK: A Deep Dive into CheckRed’s Advanced Dashboard

Jun 18, 2024

In the rapidly evolving landscape of cybersecurity, understanding and mitigating threats requires a structured and...

read more
Page 2 of 9← Prev12345...Next →Last Page
CheckRed Security logo

Inspect misconfigurations. Meet compliance requirements. Analyze risks.
An all-in-one platform for cloud, SaaS and DNS security!

Follow us on

  • Platforms
    • SSPM
    • DNSPM
    • CSPM
    • CIEM
    • CWPP
    • CNAPP
    • ITDR
    • Continuous Compliance
    • Integrations
  • SaaS Security
    • Microsoft 365
    • Salesforce
    • ServiceNow
    • Okta
    • Other Supported Apps
  • Cloud Security
    • Amazon Web Services (AWS)
    • Microsoft Azure
    • Google Cloud
    • Akamai Linode
    • Multi-cloud
  • Company
    • About Us
    • Careers
    • Contact Us
    • Resources
    • Support
Top Infosec Awards certification logo
Top Infosec Awards
SOC 2 Compliant certification logo
SOC 2 Compliant
 ISO 27001 Certified certification logo
ISO 27001 Certified
 CSA Member
CSA Member
 CSA Member
Star Level 1
© 2025 CheckRed. All Rights Reserved.
  • Privacy Policy