Cloud Security

Cyberattack and cybersecurity terms related to cloud security

Exposed Snapshot

Core to cloud data protection capabilities are snapshots, a point-in-time volume data copy that can be restored in the event of something impacting your production dataset.

Exposed Storage Bucket

To avoid storage buckets being exposed, security teams should control access to buckets and objects via identity and access management permissions.

Kubernetes (K8s)

Kubernetes, also known as K8s, is an open-source system for automating deployment, scaling, and management of containerized applications.

Kubernetes Security Posture Management (KSPM)

A complement to Cloud Security Posture Management, Kubernetes Security Posture Management (KSPM) refers to security solutions designed for continuous integration and continuous delivery (CI/CD) environments orchestrated by Kubernetes


Lambda is a serverless, event-driven compute service that lets you run code for virtually any type of application or backend service without provisioning or managing servers.

Lateral movement

After an attacker has gained an initial foothold in a network, they will typically seek to widen and cement that foothold, this techniquie is known as lateral movement.

Malicious Access

Access controls authenticate and authorize individuals to access the information they are allowed to use.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center