We are continuing on the Defense in Depth blog series with a spotlight on our practice of Cloud Variant Hunting. Read about how we fully iterate through findings that discovered by our vibrant security researcher community and our own internal processes.