Sample Secrets JSON Output Deepfence SecretScanner
Detecting Secrets to Reduce Attack Surface

In our last few articles, we focused on vulnerability scanning of hosts and containers in AWS ECS, Azure AKS, Google GKE, and Oracle OKE. In this post, we will discuss secrets management, another important aspect of cloud native security. We... Read More >

Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Runtime Threat Mapping for AWS Fargate Serverless with Deepfence blog post
Runtime Threat Mapping for AWS Fargate Serverless Deployments Using Deepfence

Deepfence Enterprise already provides support for protecting your workloads running on serverless platforms like AWS Fargate. We now announce the same enterprise quality support for serverless deployments in our community edition, ThreatMapper. Using ThreatMapper, you can now seamlessly secure your... Read More >

Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Observability and security of AWS Fargate with Deepfence
Observability and Security of AWS Fargate Serverless Deployments

Serverless computing solutions like AWS Fargate are in widespread use now-a-days due to their various advantages like scalability, productivity, cost-effectiveness, and more. With traditional VMs, users have to manage both the applications and the infrastructure. Users also need to provision... Read More >

Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Series A Deepfence Team
Milestone: Announcing our 9.5M series A!

I’m super excited to announce that we have raised $9.5M Series A, led by cyber security powerhouse Allegis Cyber. Sonae IM, a cyber & infrastructure focused investment fund based in Europe with a global mandate participated along with our pre-seed investor Chiratae Ventures,... Read More >

Sandeep Lahane
Sandeep Lahane
Visualizing Bottlerocket Based Clusters with Deepfence ThreatMapper
Use case — Runtime Threat Mapping for Bottlerocket containers using Deepfence ThreatMapper

You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers, and pods at runtime as well as container images out of container registries, as part of CI/CD pipelines. In last few articles, we described how to install Deepfence... Read More >

Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo