Posts by Ryan Blanchard

3 min Exposure Command

Rapid7 Extends Cloud Security Capabilities with Updates to Exposure Command

With purpose-built harvesting technology providing real-time visibility into everything running across multi-cloud environments, Exposure Command from Rapid7 ensures teams have an up-to-date inventory, mapping their cloud attack surface and enriching asset data with risk and business context.

2 min AWS

Rapid7 Extends AWS Support to Include Coverage for Newly-Launched Resource Control Policies (RCPs)

Rapid7 is excited to announce our support for Amazon Web Services’ (AWS) new Resource Control Policies (RCPs), a powerful tool designed to bolster security controls for organizations using AWS infrastructure.

4 min Vulnerability Management

Modernizing Your VM Program with Rapid7 Exposure Command: A Path to Effective Continuous Threat Exposure Management

This is where continuous threat exposure management (CTEM) comes into play – an approach that shifts the focus from merely identifying vulnerabilities to understanding and mitigating exposures across the entire attack surface.

4 min Events

Black Hat USA 2024: Key Takeaways and Industry Trends

As is always the case at Black Hat 2024, the cybersecurity community was buzzing with the latest innovations and insights from their favorite vendors, industry speakers and training sessions.

2 min Cloud Security

Casting a Light on Shadow IT in Cloud Environments

Shadow IT typically refers to the use of consumer apps or services without explicit IT approval. However, it can also occur at a cloud infrastructure level.

3 min Vulnerability Management

Adapting existing VM programs to regain control

From elevated expectations, processes, and tooling to pressured budgets, the scale and complexity has made identifying and addressing vulnerabilities in cloud applications and the infrastructure that supports them a seemingly impossible task.

4 min Cloud Security

Cloud IAM Done Right: How LPA Helps Significantly Reduce Cloud Risk

Today almost all cloud users, roles, and identities are overly permissive. To minimize risk, you need to adopt the principle of least privilege access.

5 min Cybersecurity

No Damsels in Distress: How Media and Entertainment Companies Can Secure Data and Content

As media and entertainment companies grow their cloud footprints, they’re also opening themselves up to vulnerabilities threat actors can exploit.

6 min Cloud Security

Shift Left: Secure Your Innovation Pipeline

As shift left has become critical to cloud security, here's how organization can implement best practices and technologies into their DevOps workflows.

4 min Cloud Security

Identifying Cloud Waste to Contain Unnecessary Costs

Cloud environments often increase complexity, which can make managing costs in the cloud more difficult.

3 min Cloud Security

Update for CIS Google Cloud Platform Foundation Benchmarks - Version 1.3.0

The Center for Internet Security (CIS) recently released an updated version of their Google Cloud Platform Foundation Benchmarks - Version 1.3.0.