re:Invent 2025, Alert Fatigue, and Unified Cloud Security | October 2025
CEO Corner
As we head to re:Invent, I'm struck by a growing gap in cloud security. Alert fatigue is paralyzing security teams. Attackers move faster than ever. Organizations juggling dozens of disconnected tools are losing. The threat landscape has fundamentally changed, and traditional approaches don't scale anymore.
But I'm seeing a clear pattern: teams moving toward unified platforms with agentless visibility, reachability analysis, and AI-driven prioritization are breaking through. They're reducing alert noise by orders of magnitude. They're detecting threats faster. They're actually securing their environments instead of just managing tools.
That's what excites me most about Re:Invent. Not showcasing what we've built, but connecting with teams ready to rethink cloud security from the ground up. The outcomes matter more than the tools. I look forward to seeing you in Las Vegas.
Stay secure,
Co-Founder and Chief Executive Officer
Hunt Threats with the Orca Pod at re:Invent 2025
We're thrilled to be heading to re:Invent this year! We can't wait to connect with everyone and showcase what we've been working on. Join us in Las Vegas as we demonstrate our latest innovations in cloud security. Want to dive deeper into how Orca Security can strengthen your AWS environment? We'd love to have a focused 1:1 conversation with our executive team to discuss your cloud security needs and explore how we deliver cloud-wide, workload-deep security and compliance for AWS.
👉 Book a meeting here
Securing Modern Cloud Workloads with CNAPP
CNAPPs (Cloud Native Application Protection Platforms) are unified security solutions that protect cloud environments by continuously monitoring for threats and addressing vulnerabilities before they reach production. Unlike fragmented security tools, CNAPPs consolidate all controls in one platform, work across multiple cloud providers, and help teams stay compliant—making cloud security simpler and more effective.
👉 Read the full article here
How Autodesk Scales with AWS & Orca Security
Hear from Sri Tiruveedhula, Principal Security Engineer at Autodesk, about how they're securing their GenAI applications built on Amazon Bedrock at enterprise scale. Learn how Orca's agentless scanning platform provides complete visibility into cloud assets, libraries, and packages, enabling Autodesk's security teams to keep pace with daily AWS deployments and quickly address misconfigurations and vulnerabilities across their entire infrastructure.
👉 Watch the full story here
The Top 5 Certifications to Pursue in 2026
As cloud adoption accelerates, so does the cybersecurity skills gap. Industry-recognized certifications have become essential for advancing your career in cloud security. This blog explores five leading certifications: ISC2 CCSP, AWS Certified Security Specialty, Google Cloud Professional Cloud Security Engineer, Microsoft Azure Security Engineer, and the vendor-neutral CCSK. Each offers different costs, experience requirements, and specializations to help you choose the right path based on your organization's cloud platform and career goals.
👉 Read the full article here
AI, Burnout, and Breaches: The Reality of Cybersecurity in 2025
This roundup compiles alarming statistics from 2025 cybersecurity research, including findings from the Orca Research Pod. The data reveals critical gaps in cloud security, rising AI-powered attacks, and widespread ransomware targeting manufacturing. Security teams face severe burnout while organizations remain unprepared for emerging threats including supply chain vulnerabilities, identity security blind spots, and agentic AI. Organizations continue to struggle managing basic security controls across increasingly complex environments.
👉 See the full roundup here
More Than a Meal: A Conversation on the Future of Cloud Security
Our CEO and Co-founder Gil Geron enters the kitchen on Cooking with CISOs to break down the real ingredients of cloud security. He discusses emerging threat vectors, where traditional approaches fall short, and the game-changing innovations reshaping how we protect cloud environments. Gil shares powerful insights about bridging the gap between DevOps and security teams, reducing cloud risks, and leveraging AI to stay ahead of threats.
👉 Watch the full episode here
AI: The Double-Edged Sword of Cybersecurity
Artificial intelligence is rapidly reshaping cybersecurity, but it cuts both ways. AI helps defenders strengthen security through faster threat detection, automated response, and smarter risk prioritization. Meanwhile, attackers use AI to craft convincing phishing campaigns, develop adaptive malware, and execute attacks at unprecedented scale. Organizations using AI for security save an average of $1.9 million per breach. Success depends on leveraging AI's strengths while preparing for the new threats it enables.
👉 Read the full article here
Reachability Analysis: Prioritize Real Vulnerabilities on AWS
Vulnerability exploitation is accelerating, with nearly one-third of exploits occurring before or on the day of CVE disclosure. Traditional tools overwhelm security teams with noise. Orca Security's Reachability Analysis helps teams distinguish between vulnerabilities in components actually used at runtime versus those that pose no real risk. By combining agentless analysis with dynamic runtime telemetry, Orca reduces exploitable vulnerabilities by 90% and eliminates alert fatigue.
👉 Read the full article here
Masters in Computer Applications/data analytics
5dFantastic
Product Marketing Manager, Orca Security
5dCan't wait to dive in!