Cyber Armor Blog

blog thumbnail image

Cyber Armor for Google Traffic Director gRPC Proxyless Services

Shauli Rozen

Jul 29, 2020

Cyber Armor takes a look at the latest announcement of Traffic Director’s support for gRPC Proxyless services in service mesh and what it means to developers and architects.

Read More
blog thumbnail image

Cyber Armor Expands Opportunities with Red Hat Certified Operator for OpenShift

Jun 4, 2020

Cyber Armor has now achieved Red Hat Operator certification for OpenShift. The collaboration extends Cyber Armor’s security technology to thousands of Red Hat enterprise customers, enabling them to get one-click zero-trust on top of their OpenShift clusters and protect their microservices from CI/CD to Runtime

Read More
blog thumbnail image

Leonid Sandler, Founder and CTO, on the Inspiration behind Cyber Armor

Shauli Rozen

May 20, 2020

Leonid Sandler, Co-Founder and CTO of Cyber Armor, set for an interview with Safety Detective’s Aviva Zacks on the inspiration behind the company.

Read More
blog thumbnail image

What COVID-19 teaches us about Micro-segmentation and Run-time Cloud Workload Protection

Shauli Rozen, CEO & Co-founder

Mar 23, 2020

In many ways, software malware and biological viruses are similar, therefore it made sense for us to take a look at what happens in the world with the impact of the Coronavirus, compare it with how cloud environments are being protected, and see what we can learn from the comparison.

Read More
blog thumbnail image

Recently found Azure vulnerabilities underline the importance of Zero-Trust for cloud workloads

Ben Hirschberg, VP R&D and Co-Founder

Feb 11, 2020

Two vulnerabilities found in Microsoft’s Azure cloud services have been recently published by researchers. These vulnerabilities prove once again that un-trusted workloads can come from many places in the cloud environment, including the out-of-your-control cloud infrastructure. Zero-trust environments can be created as a generic solution for such potential attacks.

Read More
blog thumbnail image

Do you trust your Microservices Identities?

Shauli Rozen, CEO & Co-Founder

Jan 23, 2020

A few fundamental security problems exist in the traditional microservices identity authentication Methods. These problems result in identity establishment, which is not always trustworthy, and enables potential attackers to pose as legitimate workloads. Adoption of multi-factor authentication for microservices can solve many of these challenges.

Read More
blog thumbnail image

The Migration Path to Microservices & Security Considerations, Of Course

Jan 13, 2020

While the move to microservices-based architecture is relatively new, it is already mainstream. A majority of companies are choosing it as their default architecture for new development,and you are not cool if you are not using microservices. With regards to migrating legacy apps and breaking them down to microservices, companies are showing more conservatism, and rightly so. The move creates a lot of value, mainly around new features, time to market, and scalability, but it also has its complexities and trade offs.

Read More
blog thumbnail image

Cloud Migration: Moving Your Security Mindset Along with Your Data

Ben Hirschberg, VP of R&D

Jan 13, 2020

Migrating our data to the cloud has never been easier in terms of technology. So why are so many companies still concerned with moving their data to the cloud? The answer lies in the fact that technology is a small part of moving to the cloud. Data cloud migration requires architectural changes and in many times - a mindshift.

Read More
blog thumbnail image

The Growth of Confidential Computing

Leonid Sandler, CTO & Co-Founder

Jan 13, 2020

Confidential Computing technology is an important step toward a safer digital space. Building the right tools and the right architectures around this technology to help companies utilize it is key. These technologies should provide strong confidential computing protection without requiring changing existing software components.

Read More
blog thumbnail image

The Chicken & Egg Secret Protection Problem in Micro-services

Shauli Rozen

Dec 23, 2019

Certificate, private keys, encryption keys, and other secrets proliferate in a secured cloud native environment. Making sure these keys are protected in a scalable and secured way is becoming ever more critical and are a major part of establishing a real zero-trust environment.

Read More