Newsroom
Avocado newsroom

Blogs, solutions, events, news, and more.

Black network switch with optical fiber cables

Kubernetes Security for AWS EKS Fargate – Automated by Avocado.

Securing cloud workloads is one of the top initiatives for CISO’s worldwide. Stateless workloads using Containers or Serverless platforms like EKS Fargate from AWS, are... Learn more
Blog Events Resources
Tags
Reset filters
Technology security concept safety digital protection system

Automating Threat Modeling: Prevent Your Business Data Breach

Today, cyber threats and data breaches aren’t just terms reserved for sci-fi movies and highly niche industry circles. These breaches have become a grim reality,...
Learn more

Zero-Day Attack Security: Preventing the Unforseenable

Cybercrime and cyberattacks are getting more sophisticated and more elaborate as technology advances. Zero-day attacks are among the most hard-hitting infiltrations because most organizations and...
Learn more

Application Observability for Security Operations.

Introduction Application Observability is often used to address Application Performance Monitoring and detecting bottlenecks within the target applications. However, Application Observability is also the first...
Learn more

Log4Shell Vulnerability Detection and Mitigation

                                                 ...
Learn more
Black network switch with optical fiber cables

Kubernetes Security for AWS EKS Fargate – Automated by Avocado.

Securing cloud workloads is one of the top initiatives for CISO’s worldwide. Stateless workloads using Containers or Serverless platforms like EKS Fargate from AWS, are...
Learn more

It’s all about the data(base)!

Database Security is More than Just Compliance Controls Databases, which hold more than just corporate IP, usually have standard controls in the form of firewalls,...
Learn more

Solution Brief: Protecting Financial Services Applications with Avocado

Avocado protects Open Banking APIs by applying “zero trust” security controls around the API workload.
Download

The Bad Guys are Already Inside: Time to Get Serious About Zero Trust

In our last blog, we discussed the renewed emphasis on Zero Trust Security in the Biden Administration Executive Order on Cybersecurity. This comes on the...
Learn more

Solution Brief: Detect and Respond to Advanced Threats

Download
Load more