Current space

Members

Filtered creator directory for "Deborah Galea".

Directory 201.5K Indexed posts 43M Verified 0
Active AuthorsRecent indexed creators Registered MembersAccount directory Completed ProfilesProfiles with public details VerifiedTrusted member signals
201.5KActive members
43MIndexed posts
286KDetailed profiles
11Sources in this view

Active authors

Showing directory results matching your search with real activity counts for visible profiles.

Page 1 | 11 shown
B
2022 State of Public Cloud Security: Revealing Security Gaps
2022 State of Public Cloud Security: Revealing Security Gaps
Bar Kaduri, Deborah Galea avatar
@Bar Kaduri, Deborah Galea
Bar Kaduri,
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
2022 State of Public Cloud Security: Revealing Security Gaps
orca.security
0Following 0Comments 0Views 0Shares
B
How Orca’s Attack Path Analysis Enables Strategic Remediation
How Orca’s Attack Path Analysis Enables Strategic Remediation
Bar Lavie, Deborah Galea avatar
@Bar Lavie, Deborah Galea
Bar Lavie,
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
How Orca’s Attack Path Analysis Enables Strategic Remediation
orca.security
0Following 0Comments 0Views 0Shares
D
5 Considerations for Evaluating CNAPP Vendors | Orca Security
Orca Security 2022 Cloud Security Alert Fatigue Report
Spring4Shell CVE 2022-22965 versus CVE-2022-22963
5 Considerations for Evaluating CNAPP Vendors | Orca Security
Deborah Galea avatar
@Deborah Galea
Deborah Galea
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 5Posts 1Sources 0Reputation
Latest signal 0 reactions
5 Considerations for Evaluating CNAPP Vendors | Orca Security
orca.security
0Following 0Comments 0Views 0Shares
D
Why Agent-based Security Fails in Quick Response Scenarios
Why Agent-based Security Fails in Quick Response Scenarios
Deborah Galea, Keith Mokris avatar
@Deborah Galea, Keith Mokris
Deborah Galea,
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Why Agent-based Security Fails in Quick Response Scenarios
orca.security
0Following 0Comments 0Views 0Shares
D
Container Security Best Practices | Orca Security
Container Security Best Practices | Orca Security
Deborah Galea, Neil Carpenter avatar
@Deborah Galea, Neil Carpenter
Deborah Galea,
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Container Security Best Practices | Orca Security
orca.security
0Following 0Comments 0Views 0Shares
D
Why Orca Security is Integrating AI-SPM | Orca Security
Why Orca Security is Integrating AI-SPM | Orca Security
Deborah Galea, Shai Alon avatar
@Deborah Galea, Shai Alon
Deborah Galea,
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Why Orca Security is Integrating AI-SPM | Orca Security
orca.security
0Following 0Comments 0Views 0Shares
I
Elevate CIEM with IAM Remediation | Orca Security
Elevate CIEM with IAM Remediation | Orca Security
Itamar Golan, Deborah Galea avatar
@Itamar Golan, Deborah Galea
Itamar Golan,
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Elevate CIEM with IAM Remediation | Orca Security
orca.security
0Following 0Comments 0Views 0Shares
S
Democratize Cloud Security with AI-powered Cloud Asset Search
Democratize Cloud Security with AI-powered Cloud Asset Search
Shai Alon, Deborah Galea avatar
@Shai Alon, Deborah Galea
Shai Alon,
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Democratize Cloud Security with AI-powered Cloud Asset Search
orca.security
0Following 0Comments 0Views 0Shares
S
2024 State of Cloud Security Report: Top Cloud Security Risks | Orca Security
2024 State of Cloud Security Report: Top Cloud Security Risks | Orca Security
Shir Sadon, Deborah Galea avatar
@Shir Sadon, Deborah Galea
Shir Sadon,
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
2024 State of Cloud Security Report: Top Cloud Security Risks | Orca Security
orca.security
0Following 0Comments 0Views 0Shares
T
4 Examples of How Orca CDR Detects Cloud Attacks in Progress
4 Examples of How Orca CDR Detects Cloud Attacks in Progress
Tami Lavi, Deborah Galea avatar
@Tami Lavi, Deborah Galea
Tami Lavi,
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
4 Examples of How Orca CDR Detects Cloud Attacks in Progress
orca.security
0Following 0Comments 0Views 0Shares
V
5 Best Practices for PCI DSS Compliance in the Cloud
5 Best Practices for PCI DSS Compliance in the Cloud
Vini Mostovoy, Deborah Galea avatar
@Vini Mostovoy, Deborah Galea
Vini Mostovoy,
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
5 Best Practices for PCI DSS Compliance in the Cloud
orca.security
0Following 0Comments 0Views 0Shares