Posts tagged Cloud Security

2 min Cloud Security

Heartland Dental’s Ambitions Land Them in the Cloud

We sat down with Heartland Dental to talk about why they chose Rapid7, how quickly they’re expanding, and why it’s time to shift services to the cloud.

9 min Cloud Security

Augmenting Native Cloud Service Provider Security

Most organizations already have some level of cloud infrastructure services; infrastructure-as-a-service , platform-as-a-service, function-as-a-service or serverless—and as more workloads migrate to and are built on the cloud, the top cloud security concern for any organization is a data breach.

8 min Cloud Security

Cloud Best Practices Every Security Professional Should Know

In part one of this series on the cloud and cloud security for security professionals, we dove into everything you’ve ever wanted to know about the cloud.

3 min InsightCloudSec

The Net Effect: Why Cloud IAM Is So Difficult

Managing identity and access management (IAM) in the cloud is a complex problem—far more complex than it is in traditional, on-premises IT environments guarded by an explicit firewall.

4 min Remote Working

Back to Basics: Maintaining Cloud Migration Oversight While Navigating the New Normal

On the final installment of our Remote Work Readiness Series, Rapid7 taps industry insiders for what the future of security leadership might look like.

7 min Cloud Security

The Security Practitioner's Intro to the Cloud: Everything You Ever Wanted to Know But Were Afraid to Ask

In this post, we provide an introductory primer to the cloud and cloud security for security professionals who want to fill in the blanks.

2 min Cloud Security

DivvyCloud by Rapid7 Announces New Infrastructure as Code Security Capability

DivvyCloud by Rapid7, the leading cloud security platform, today released a new core capability, Infrastructure as Code (IaC) Security. This capability integrates cloud security into the DevOps process, improving developer productivity and preventing cloud security issues during the build process.

2 min

Rapid7 Announces Intent to Acquire DivvyCloud

We are thrilled to announce that today we have entered into a definitive agreement to acquire DivvyCloud.

5 min Events

How We Used Data Science Magic to Predict Key RSA 2020 Themes and Takeaways

As our team discussed our traditional RSA round-up blog, we started to wonder how easy it would be to predict those key themes before the conference even kicked off.

4 min Cloud Security

How to Handle Misconfigurations in the Cloud

In part three of our four-part series on security in the cloud, we will cover how to handle misconfigurations in the cloud.

2 min InsightCloudSec

Security Isn’t a Four-Letter Word: How Infrastructure as Code (IaC) Amplifies DevOps Through the Inclusion of Security

Our fast-paced lives are fueled by innovative, cloud-native companies. We are able to watch our favorite programs and movies from anywhere in the world on any device. We are able to collaborate with our colleagues on an upcoming presentation, regardless of whether we’re in the office or at home.

3 min Cloud Security

Seven Tips for Better Cloud Security in 2020

In this blog post, we will highlight seven tips for shoring up your cloud security in the new year.

2 min InsightCloudSec

What Is Cloud Security Posture Management (CSPM)?

As the cloud grows, so too does the playing field of participants. Between infrastructure management (IaaS, PaaS, fPaaS, SaaS, Raas) security, CI/CD, and trying to navigate all of the nuances in between, it’s difficult to keep track of what each category of tooling includes.

3 min Cloud Security

Full-Lifecycle Cloud Security

When security teams find cloud vulnerabilities and misconfigurations at runtime, they are often blamed for introducing friction into the continuous integration/continuous delivery (CI/CD) pipeline and stifling the enterprise’s ability to innovate as efficiently as possible.

3 min Cloud Security

Automation You Can Trust: Remediating Cloud Misconfigurations and Policy Violations in Real Time

Automated remediation can be an effective tool for ensuring system security. There are few things more distressing than having a remediation tool that’s intended to avoid disaster inadvertently create one.