Orca Security’s new search tool takes natural language queries to hunt for Log4j-like vulnerabilities. Credit: Shutterstock To help enterprise users dig up hidden cloud misconfigurations so as to avoid log4j-like catastrophic vulnerabilities, Orca Security has introduced a new cloud asset search option on its cloud security platform backed by large language models. The new feature, which borrows capabilities from Orca's existing Azure andOpenAI integration and combines it with Elasticsearch and other in-house AI technology, will enable users to ask natural language questions like "Do I have any public facing Log4j vulnerability?" or "Do I have any unencrypted databases exposed to the internet?" "Orca's AI-driven search now allows users of any skill level to perform searches in their cloud environment and allows advanced users to craft complex and granular queries much faster than any human can," said Gil Geron, chief executive officer and co-founder of Orca Security. The AI-driven search capabilities are currently available to Orca customers by feature request without any additional cost. It will soon be made generally available through the Orca cloud security platform. Existing tools have tech-heavy asks Existing tools, according to Geron, perform cloud asset searches through coding in a query language, or using a query builder, which requires a specific skill set. "These methods often require users to read lengthy documentation or receive training in order to create accurate and granular searches," Geron said. "The more difficult it is to create search queries, the more chance there is that they aren't configured properly, resulting in low-quality data." This means that cloud search is only available to skilled users, making other less technical users such as compliance and risk governance teams dependent on these users, leading to teams underutilizing cloud search and making uninformed decisions. New capability streamlines cloud asset discovery Cloud environments house a collection of business-critical assets including virtual machines, databases, storage instances, containers, networking components, applications, etc. It is important to have a simple yet scalable cloud asset discovery tool that can identify, categorize, and map all digital assets. Orca's agentless, AI-driven search is designed to identify and respond to zero-day risks, optimizing cloud assets, and understanding exposure to threats to facilitate data-driven decisions. "Orca has made strong efforts in providing a platform simplifying cloud security, so it makes sense that they address the visibility need for security teams to scale to support rapidly scaling cloud-native development," said Melinda Marks, analyst at ESG Global. "Applying generative AI is also helpful to make it easier for security teams or those responsible for security (including developers, DevOps, site reliability engineers) to easily make queries that can generate the information they need to speed remediation." Orca also claims 100% visibility for asset discovery delivered through its patented SideScanning technology, which combined with the new AI-driven search, is expected to affect a complete cloud asset protection. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe