Amazon Web Services Identity and Access Management, by the Numbers

Introduction Traditionally, perimeter security was about what tools, devices, and procedures can be placed around a network to prevent bad things from going in or out. In a cloud platform, there’s an additional layer of controls that specify the access… Continue reading Amazon Web Services Identity and Access Management, by the Numbers

How DivvyCloud By Rapid 7 Keeps Customer Clouds Out of the News

Any organization that is transitioning to public cloud and using one or more cloud service providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), should immediately consider shifting toward a new model of securi… Continue reading How DivvyCloud By Rapid 7 Keeps Customer Clouds Out of the News

Health & Life Sciences Guide: How to Stay Secure in the Cloud While Driving Innovation & Discovery

Introduction Health and life sciences organizations are experiencing a culture shift as they respond to demand for improved healthcare information, experiences, products, and services. Building applications and migrating regulated workloads to Amazon W… Continue reading Health & Life Sciences Guide: How to Stay Secure in the Cloud While Driving Innovation & Discovery

Health & Life Sciences Guide: How to Stay Secure in the Cloud While Driving Innovation & Discovery

Introduction Health and life sciences organizations are experiencing a culture shift as they respond to demand for improved healthcare information, experiences, products, and services. Building applications and migrating regulated workloads to Amazon W… Continue reading Health & Life Sciences Guide: How to Stay Secure in the Cloud While Driving Innovation & Discovery

Shifting Cloud Security Left with Infrastructure as Code

Introduction and Executive Summary DevOps and the continuous integration/continuous deployment (CI/CD) pipeline are revolutionizing application development, test, and cloud delivery, enabling developers to write the application code and define the clou… Continue reading Shifting Cloud Security Left with Infrastructure as Code