Cyber Armor Blog

blog thumbnail image

Recently found Azure vulnerabilities underline the importance of Zero-Trust for cloud workloads

Ben Hirschberg, VP R&D and Co-Founder

Feb 6, 2020

Two vulnerabilities found in Microsoft’s Azure cloud services have been recently published by researchers. These vulnerabilities prove once again that un-trusted workloads can come from many places in the cloud environment, including the out-of-your-control cloud infrastructure. Zero-trust environments can be created as a generic solution for such potential attacks.

Read More
blog thumbnail image

Do you trust your Microservices Identities?

Shauli Rozen, CEO & Co-Founder

Jan 23, 2020

A few fundamental security problems exist in the traditional microservices identity authentication Methods. These problems result in identity establishment, which is not always trustworthy, and enables potential attackers to pose as legitimate workloads. Adoption of multi-factor authentication for microservices can solve many of these challenges.

Read More
blog thumbnail image

The Growth of Confidential Computing

Leonid Sandler, CTO & Co-Founder

Jan 13, 2020

Confidential Computing technology is an important step toward a safer digital space. Building the right tools and the right architectures around this technology to help companies utilize it is key. These technologies should provide strong confidential computing protection without requiring changing existing software components.

Read More
blog thumbnail image

The Chicken & Egg Secret Protection Problem in Micro-services

Shauli Rozen

Dec 23, 2019

Certificate, private keys, encryption keys, and other secrets proliferate in a secured cloud native environment. Making sure these keys are protected in a scalable and secured way is becoming ever more critical and are a major part of establishing a real zero-trust environment.

Read More