DEV Community

CloudDefense.AI profile picture

CloudDefense.AI

CloudDefense.AI is an industry-leading CNAPP platform that provides instant, 360 degree visibility and risk reduction for your Cloud and Applications.

Location Palo Alto, CA 94301 Joined Joined on  Personal website https://www.clouddefense.ai/ twitter website
Building a “Shift-Left” Pipeline: Automated Security Testing with QINA Pulse

Building a “Shift-Left” Pipeline: Automated Security Testing with QINA Pulse

1
Comments
2 min read

Want to connect with CloudDefense.AI?

Create an account to connect with CloudDefense.AI. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
SASE vs CASB: Key Differences

SASE vs CASB: Key Differences

1
Comments
3 min read
CIEM vs PAM: Key Differences, Benefits, and Use Cases in Modern Security

CIEM vs PAM: Key Differences, Benefits, and Use Cases in Modern Security

1
Comments
3 min read
SASE vs. SSE: What Is the Difference?

SASE vs. SSE: What Is the Difference?

1
Comments
2 min read
Zero Trust vs ZTA vs ZTNA: Key Differences

Zero Trust vs ZTA vs ZTNA: Key Differences

1
Comments
2 min read
Build-Time vs Run-Time Security: Learn Why You Need Both!

Build-Time vs Run-Time Security: Learn Why You Need Both!

1
Comments
3 min read
End-to-End AppSec Automation: From Detection to Remediation with QINA Pulse

End-to-End AppSec Automation: From Detection to Remediation with QINA Pulse

1
Comments
2 min read
QINA Pulse vs Traditional Tools: Which Security Automation Wins?

QINA Pulse vs Traditional Tools: Which Security Automation Wins?

1
Comments
2 min read
What is Pulse-Style Security Automation and Why It Matters

What is Pulse-Style Security Automation and Why It Matters

Comments
2 min read
6 Powerful Use Cases of AI in Security Automation

6 Powerful Use Cases of AI in Security Automation

1
Comments
3 min read
QINA Pulse: Best Tool to Reduce Security Workload and Boost Developer Efficiency

QINA Pulse: Best Tool to Reduce Security Workload and Boost Developer Efficiency

1
Comments
2 min read
How ChatOps Is Modernizing Security Remediation in DevSecOps

How ChatOps Is Modernizing Security Remediation in DevSecOps

Comments
2 min read
A Step-By-Step Guide to Automating AppSec Workflows Effectively

A Step-By-Step Guide to Automating AppSec Workflows Effectively

1
Comments
2 min read
SAST for Python, Java, JavaScript & Go: What’s Different?

SAST for Python, Java, JavaScript & Go: What’s Different?

1
Comments
2 min read
Automating Vulnerability Triage in Application Security

Automating Vulnerability Triage in Application Security

Comments
2 min read
Integrating SAST into Your DevSecOps Pipeline

Integrating SAST into Your DevSecOps Pipeline

Comments
2 min read
How to Secure Your Source Code Before Production with QINA Clarity (AI SAST)

How to Secure Your Source Code Before Production with QINA Clarity (AI SAST)

Comments
3 min read
QINA Clarity AI: Next-Gen SAST for Code, Package & API Security

QINA Clarity AI: Next-Gen SAST for Code, Package & API Security

Comments
2 min read
The Hidden Cost of False Positives in Application Security

The Hidden Cost of False Positives in Application Security

Comments
2 min read
Fast & Secure: How QINA Clarity Scans in Under 2 Minutes

Fast & Secure: How QINA Clarity Scans in Under 2 Minutes

Comments
2 min read
Zero Trust Security vs. Perimeter Security: Key Differences

Zero Trust Security vs. Perimeter Security: Key Differences

Comments
2 min read
How to Reduce False Positives in SAST With Qina Clarity

How to Reduce False Positives in SAST With Qina Clarity

Comments
2 min read
CSPM vs SSPM: Which one do you need?

CSPM vs SSPM: Which one do you need?

Comments
2 min read
What is AI-SAST? Why it Matters?

What is AI-SAST? Why it Matters?

Comments
2 min read
What is 802.1X Authentication?

What is 802.1X Authentication?

Comments
3 min read
What Is the Role of NIST 800-218 in Modern Software Development?

What Is the Role of NIST 800-218 in Modern Software Development?

Comments
2 min read
What is User and Entity Behavior Analytics? (UEBA)

What is User and Entity Behavior Analytics? (UEBA)

Comments
2 min read
What is Open-Source Intelligence (OSINT)?

What is Open-Source Intelligence (OSINT)?

Comments
4 min read
What is Proactive Risk Management?

What is Proactive Risk Management?

Comments
3 min read
What is Microsegmentation?

What is Microsegmentation?

Comments
2 min read
What is a Cross-site request forgery (CSRF) attack?

What is a Cross-site request forgery (CSRF) attack?

Comments
2 min read
What is SLSA?

What is SLSA?

1
Comments
3 min read
What is COBIT? Control Objectives for Information and Related Technology

What is COBIT? Control Objectives for Information and Related Technology

Comments
2 min read
Shift Left for AI Coding Assistants: How to Enforce AppSec Early with Cursor & Windsurf

Shift Left for AI Coding Assistants: How to Enforce AppSec Early with Cursor & Windsurf

Comments 1
3 min read
Benchmarking AI-Generated Code: Cursor vs Windsurf vs Secure Coding Standards

Benchmarking AI-Generated Code: Cursor vs Windsurf vs Secure Coding Standards

1
Comments
3 min read
What is CIAM? Customer Identity and Access Management

What is CIAM? Customer Identity and Access Management

Comments
2 min read
What is Firewall Configuration?

What is Firewall Configuration?

Comments
2 min read
What is a Proxy Server?

What is a Proxy Server?

Comments
2 min read
What is Hyperscale?

What is Hyperscale?

Comments
2 min read
Secure-By-Design: Embedding AppSec into Cursor and Windsurf-Driven Development Workflow

Secure-By-Design: Embedding AppSec into Cursor and Windsurf-Driven Development Workflow

Comments
2 min read
What is a QR Code?

What is a QR Code?

Comments
2 min read
What is a Software Firewall?

What is a Software Firewall?

Comments
2 min read
Detecting and Fixing Vulnerabilities in Code Suggested by Cursor and Windsurf

Detecting and Fixing Vulnerabilities in Code Suggested by Cursor and Windsurf

1
Comments
3 min read
What is IT Infrastructure?

What is IT Infrastructure?

Comments
2 min read
Why You Need Application Security Guardrails for Cursor and Windsurf AI Agents

Why You Need Application Security Guardrails for Cursor and Windsurf AI Agents

Comments
2 min read
What is CTEM?

What is CTEM?

Comments
3 min read
What is Root Cause Analysis (RCA) in Cybersecurity?

What is Root Cause Analysis (RCA) in Cybersecurity?

Comments
3 min read
Difference between pod and container in Kubernetes

Difference between pod and container in Kubernetes

Comments
2 min read
What is Confidential Computing?

What is Confidential Computing?

Comments
2 min read
What is a Trojan Horse? Trojan Malware Explained

What is a Trojan Horse? Trojan Malware Explained

Comments
2 min read
AI Code Assistants Meet AppSec: Automatically Securing Cursor and Windsurf Outputs

AI Code Assistants Meet AppSec: Automatically Securing Cursor and Windsurf Outputs

Comments
2 min read
What is a CRLF Injection Attack?

What is a CRLF Injection Attack?

Comments
3 min read
How to Auto-Secure Code Generated by Cursor and Windsurf

How to Auto-Secure Code Generated by Cursor and Windsurf

Comments
2 min read
What is FTP? File Transfer Protocol

What is FTP? File Transfer Protocol

Comments
2 min read
MCP vs Codium AI: Control Plane Coordination vs Automated Code Generation

MCP vs Codium AI: Control Plane Coordination vs Automated Code Generation

Comments
2 min read
What is Account Takeover (ATO)?

What is Account Takeover (ATO)?

Comments
2 min read
MCP vs Cursor: Multi-Agent Orchestration vs AI Coding Assistant

MCP vs Cursor: Multi-Agent Orchestration vs AI Coding Assistant

1
Comments 1
2 min read
5 Common Cloud Threats Exploiting Agentic AI Systems

5 Common Cloud Threats Exploiting Agentic AI Systems

Comments
2 min read
What is an HTTP Proxy?

What is an HTTP Proxy?

3
Comments 2
3 min read
What is a CERT (Computer Emergency Response Team)?

What is a CERT (Computer Emergency Response Team)?

Comments
2 min read
loading...