© 2023 Prancer, Inc.

blog

Prancer
September 13, 2020

Drive-By Cyber Attacks

In many cases, a cyber attack is only successful if a user takes a certain action, including clic...

Read more
Prancer
September 13, 2020

Password Cyber Attack

When it comes to cloud security, passwords are often the first line of defense. They play an esse...

Read more
Prancer
September 13, 2020

Phishing Cyber Attacks

Cyber attacks come in a variety of forms and malicious parties are constantly working to find new...

Read more
Prancer
August 27, 2020

Recent Attack on Twilio Highlights Need for IaC Security

If you aren’t familiar with Twilio, it is a communication service company that uses a cloud-based...

Read more
Prancer
August 13, 2020

Proactive Infrastructure as Code Security and Compliance Approaches

In the past, cloud security practices relied on developers catching misconfigurations, identifyin...

Read more
Prancer
August 6, 2020

The Next Phase of IaC

In just the past couple of decades, there have been three major revolutions when it comes to data...

Read more
Prancer
August 6, 2020

IaC and DevOps Report for Summer 2020

Accurics has just released the latest erosion of its “State of DevOps” reports for the summer of ...

Read more