2 min
Cloud Security
A Look at Our Development Process of the Cloud Resource Enrichment API
Rapid7 has developed a new Cloud Resource Enrichment API that streamlines data retrieval from various cloud resources.
4 min
Cloud Security
Why Your AWS Cloud Container Needs Client-Side Security
With complex network infrastructure and the need to deploy applications across various environments, cloud containers have become increasingly necessary.
2 min
Cloud Security
CIEM is Required for Cloud Security and IAM Providers to Compete: Gartner® Report
Cloud Security and IAM providers should consider prioritizing specific CIEM capabilities according to a new Gartner report.
3 min
Cloud Infrastructure
Unifying Threat Findings to Elevate Your Runtime Cloud Security
Widespread growth in cloud adoption in recent years has given businesses across industries the ability to transform in new ways, often forcing them to choose between slowing the pace of their innovation or taking on massive amounts of unmanaged risk.
3 min
Cloud Security
Reducing Risk In The Cloud with Agentless Vulnerability Management
In order to gain visibility into vulnerabilities in their public cloud environments, many organizations still rely on agent or network-based scanning technology that was initially built for traditional infrastructure and endpoints.
5 min
Cloud Security
Real-Time Risk Mitigation in Google Cloud Platform
With Google Cloud Next happening this week, there’s been some recent water cooler talk where discussions about what makes Google Cloud Platform unique when it comes to security.
6 min
Cloud Security
Shift Left: Secure Your Innovation Pipeline
As shift left has become critical to cloud security, here's how organization can implement best practices and technologies into their DevOps workflows.
5 min
Cloud Security
Cloud Complexity Requires a Unified Approach to Assessing Risk
As organizations move to the public cloud, there is an increasing need for a security strategy that aligns with the varied states of cloud maturity.
5 min
Events
Security Is Shifting in a Cloud-Native World: Insights From RSAC 2022
Here's a closer look at what two Rapid7 presentations from RSAC 2022 had to say about security in a cloud-native world.
3 min
Cloud Security
Update for CIS Google Cloud Platform Foundation Benchmarks - Version 1.3.0
The Center for Internet Security (CIS) recently released an updated version of their Google Cloud Platform Foundation Benchmarks - Version 1.3.0.
3 min
Cloud Security
To the Left: Your Guide to Infrastructure as Code for Shifting Left
Shifting cloud security left helps teams catch misconfigurations, avoid security bottlenecks, and keep both DevOps and SecOps happy.
2 min
Cloud Security
Cloud Challenges in the Age of Remote Work: Rapid7’s 2021 Cloud Misconfigurations Report
The cloud has increased innovation, but it’s also impacted security risks. Our 2021 Cloud Misconfigurations Report takes a closer look at those risks.
3 min
Cloud Security
Cloud Security Glossary: Key Terms and Definitions
The cloud security experts here at Rapid7 have created a list of key terms and concepts to help you continue your journey into cloud security and DevSecOps with clarity and confidence.
3 min
Identity Access Management (IAM)
All about the boundaries: The cloud IAM lifecycle approach
Implementing cloud Identity Access Management (IAM) boundaries can seem like an oxymoron in the midst of rapid growth or need for access as new personnel, teams, or supply-chain partners come online.
3 min
Cloud Infrastructure
Reducing Risk With Identity Access Management (IAM)
As your supply chain grows, so does your attack surface. As business scales up and cloud providers release new services and resources to support, it becomes exponentially more challenging for security teams to manage access.