RAD Security is a cloud native security platform that creates behavioral fingerprints of cloud workloads, infrastructure, and identities. The platform utilizes eBPF technology to establish baseline behaviors across software supply chain, cloud infrastructure, and Kubernetes environments. It provides runtime verification capabilities to detect deviations from established behavioral patterns, focusing on identifying potential security incidents in cloud native environments. The solution offers capabilities for: - Kubernetes security posture management - Cloud native identity and access monitoring - Software supply chain verification - Runtime threat detection - Cloud infrastructure security monitoring - Behavioral-based zero-day attack detection
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
ScubaGear assesses Microsoft 365 tenant configurations against CISA Secure Configuration Baselines, using PowerShell and Open Policy Agent to compare settings and generate compliance reports.
A comprehensive cloud security platform that provides threat prevention, posture management, and risk prioritization across cloud applications, networks, and workloads.
Exploring the transition towards real sandbox containers and the differences in privileges compared to traditional sandboxes like Chrome.
Grype is a vulnerability scanner for container images and filesystems that scans for known vulnerabilities and supports various image formats.
Stay up-to-date on the latest trends and developments in AWS Cloud Security with this weekly digest newsletter.
Open source multi-cloud security-auditing tool for assessing security posture of cloud environments.
Comprehensive set of security controls for various AWS services to ensure a secure cloud environment.
AWS serverless cloud security tool for parsing and alerting on CloudTrail logs using EQL.
A small project for continuous auditing of internet-facing AWS services
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.