Securing your cloud with CSPM
3 min readDec 5, 2019
As companies begin to move their infrastructure and products to cloud environments, attackers’ interest also increases in them. This, coupled with the rise of new technologies such as Docker or Kubernetes makes it difficult to track the assets belonging to a product or organization.
This generates some dangerous situations that, in addition, are the principal attack vector: We don’t know what we have and…