Posts tagged InsightCloudSec

3 min Cloud Security

Uncover and Remediate Toxic Combinations with Attack Path Analysis

Attack Path Analysis enables users to quickly identify potential avenues that bad actors could use to access and navigate your cloud environment.

3 min Cloud Security

Detect and Prioritize Identity-Related Cloud Risk with InsightCloudSec

We are pleased to introduce our next advancement of identity-related risk management and remediation in Rapid7's InsightCloudSec: Identity Analysis.

3 min InsightCloudSec

Introducing: ‘Saved Filters’ in InsightCloudSec

New InsightCloudSec release includes "Saved Filters" capability, which lets users save filter combinations they use regularly.

4 min Cloud Security

New InsightCloudSec Compliance Pack: Implementing and Enforcing ISO 27001:2022

In this article, we discuss how the recently released ISO 27001:2022 compliance pack for InsightCloudSec can benefit your organization.

5 min Cloud Security

Center for Internet Security (CIS) unveils Azure Foundations Benchmark v2.0.0

CIS recently unveiled the latest version of their Azure Foundations Benchmark. This is the first major release since its launch more than 4 years ago.

2 min Cloud Security

Reduce Risk and Regain Control with Cloud Risk Complete

Detect and manage risk across cloud environments, endpoints, on-premises infrastructure, and web applications, with Rapid7's Cloud Risk Complete.

4 min Cloud Security

MITRE ATT&CK® Mitigations: Thwarting Cloud Threats With Preventative Policies and Controls

It's essential to implement robust security measures to protect your organization. One way to do this is to utilize the MITRE ATT&CK framework.

4 min InsightCloudSec

New InsightCloudSec Compliance Pack: Key Takeaways From the Azure Security Benchmark V3

In this article, we look at the new Azure Security Benchmark V3 and identify some of the controls that we view as particularly impactful.

3 min Cloud Security

Hallmark Channel: Securing the Season

In 2021, Hallmark Channel finished as the number one network among “women 18 and above”, which led to $147.8 million in revenue generated from holiday programming alone. It’s safe to assume the company doesn’t want intellectual property (IP) theft cutting into those kinds of returns.

4 min Cloud Security

Cloud Security and Compliance Best Practices: Highlights From The CSA Cloud Controls Matrix

In this blog post, we’ll dive into one of the most commonly-used cloud security standards for large, multi-cloud environments: the CSA Cloud Controls Matrix (CCM).

4 min Compliance

Cloud Audit: Compliance + Automation

Today’s regulatory environment is incredibly fractured and extensive. However, deploying a cloud security posture management (CSPM) can ease the administrative burden associated with staying in compliance.

3 min InsightCloudSec

Can Cloud Security Be Easier Than Complex?

Cloud security is one dish in the larger holiday meal of a company’s entire budget. Fighting for scraps of funding is hard, so it’s important to identify exactly what you need.

3 min Cloud Infrastructure

Unifying Threat Findings to Elevate Your Runtime Cloud Security

Widespread growth in cloud adoption in recent years has given businesses across industries the ability to transform in new ways, often forcing them to choose between slowing the pace of their innovation or taking on massive amounts of unmanaged risk.

3 min Cloud Security

Reducing Risk In The Cloud with Agentless Vulnerability Management

In order to gain visibility into vulnerabilities in their public cloud environments, many organizations still rely on agent or network-based scanning technology that was initially built for traditional infrastructure and endpoints.

5 min Cloud Security

Aligning to AWS Foundational Security Best Practices With InsightCloudSec

When an organization is moving their IT infrastructure to the cloud or expanding with net-new investment, the hardest tasks for the security team is to identify the proper security policies and controls to keep their cloud environments secure and the applications and sensitive data they host safe.