Blog post image - Exploitability vs Vulnerability
Exploitability Vs Vulnerability — Leveraging Exploitability for Vulnerability Management

Modern cloud native applications are complex and have a lot of dependencies on external libraries including open source components with many known vulnerabilities. Managing and fixing a large number of vulnerabilities in multiple components is a tedious job. Adoption of... Read More >

Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Blog post - Use Case Runtime Threat Mapping for Amazon ECS Using Deepfence ThreatMapper
Use Case – Runtime Threat Mapping for Amazon ECS Using Deepfence ThreatMapper

Recently we released ThreatMapper, a subset of the Deepfence cloud native workload protection platform, completely free for community use with no upgrade obligations. This is not just another ordinary command line scanner! ThreatMapper is an enterprise grade feature set of... Read More >

Sandeep Lahane
Sandeep Lahane