David Puzas

Make Cloud Defense a Team Sport by Turning DevOps into a Force Multiplier
Do You Know Who’s in Your Cloud? Preventing Identity-Based Threats with CIEM
GitOps and Shift Left Security: The Changing Landscape of DevSecOps
Top Threats You Need to Know to Defend Your Cloud Environment
Runtime Protection: The Secret Weapon for Stopping Breaches in the Cloud
Why You Need an Adversary-focused Approach to Stop Cloud Breaches
5 Common Hybrid IT Security Challenges and How to Overcome Them
Four Key Factors When Selecting a Cloud Workload Protection Platform
Shift Left Security: The Magic Elixir for Securing Cloud-Native Apps
Stop Cloud Breaches With Threat Graph Cloud-Powered Analytics: Intelligent, Automated, Accurate
Community Power: The CrowdStrike Security Cloud Network Effect
The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure
Do You Know What’s Hiding in Your Containers?
Two Sides of the Same Coin: Protecting Data in the Cloud Is a Shared Responsibility
To Get Cloud Security Cooking, You Need The Right Recipe For Success
So You Think Your Containers Are Secure? Four Steps to Ensure a Secure Container Deployment
You Can’t Protect What You Can’t See: Five Cloud Security Must-haves
Modern Infrastructure Requires Modern Cloud Security
Clarity in the Cloud: See More, Know More, Do More With Falcon Horizon