Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2025

Introducing Cloud Compliance in ARMO Platform!

We are thrilled to announce that Cloud Compliance is now available in ARMO platform, providing security and compliance teams with a powerful way to assess and maintain compliance across their AWS environments. With this new capability, ARMO automatically scans your cloud assets against industry-leading frameworks, ensuring that your cloud security posture aligns with best practices and regulatory requirements.

Runtime Security Tools: A Comprehensive Guide for 2025

While Cloud Security Posture Management (CSPM) and hardening are crucial security processes for maintaining a strong security posture, applications are most vulnerable during runtime, where unexpected threats can emerge. CSPM tools continuously scan cloud environments to detect misconfigurations, enforce compliance, and prioritize risks based on potential impact. However, runtime security becomes essential for addressing dynamic threats.

Runtime security in cloud environments: what you need to know

Unlike static environments, cloud workloads are constantly shifting, with containers and virtual machines spinning up and down, and crucial sensitive information flowing dynamically across multiple platforms. Recent incidents, such as the increase in container-based malware infections and cloud misconfigurations resulting in major data breaches, have highlighted the need for runtime security.

Advanced container registry scanning is now available in ARMO!

Exciting news for ARMO Platform users! We’re thrilled to announce the new version of container registry scanning to our suite of security features. This powerful enhanced capability improves your container security posture by allowing you to detect vulnerabilities earlier in the development process.

Why securing cloud-native applications goes beyond AppSec?

In today’s landscape of microservices, Kubernetes, and cloud environments, attacks can come from multiple vectors, with varying degrees of complexity. Understanding these vectors and how to detect them is crucial for securing your infrastructure and applications. This post will explore various attack scenarios including SQL Injection and Cluster Takeover, structured around the 4 Cs of cloud security: Cloud, Cluster (Kubernetes), Container (workload), and Code (application).