7 May 2019

A Deep Dive into Serverless Attacks, SLS-5: Broken Access Control in Serverless Deployments

Broken Access
Maintaining good access control in traditional apps is one of the hardest tasks. It involves both code and configuration. Both in the application and the infrastructure level. With the right serverless security tools, you will be to enforce least privilege permissions for code, without depending on the developer to know how to do that.
22 April 2019

Winter is Coming

The WAF Wall is Crumbling Whether you align with the North or the South, you have one common […]
4 April 2019

Who’s on your Starting Lineup?

It’s a new season, everyone is full of hope and optimism that this will be their year- that […]
8 March 2019

A Deep Dive into Serverless Attacks, SLS-4: XML External Entity (XXE) Attacks

A Deep Dive into Serverless Attacks
Let me first apologize for the long absence. However, I haven’t been idle. I’ve been working hard to […]
21 February 2019

Cloud Native Security: What it Means

Cloud Native Security: What it Means
Cloud-native applications are applications that have been built purposely to be deployed and operated in a cloud environment. […]
5 February 2019

Serverless Computing Security Risks & Challenges

Serverless architectures speed time to market
Serverless Architecture = What Cloud Should Be Serverless enables you to shift even more infrastructure management responsibilities to […]
8 January 2019

Level Up on Security with the New Damn Vulnerable Serverless App

Welcome to 2019. The year we will all understand that serverless is not a fleeting trend, but is […]
6 December 2018

The Serverless Show: re:Invent Recap

For this episode, Hillel from Protego was joined by Forrest Brazeal, a senior cloud architect at Trek10 and […]
29 November 2018

For Cloud Native, Application Security Starts with Identity Management

This article by Protego Labs CTO and co-founder Hillel Solow was originally published in The New Stack. I had […]