Showing: 1 - 6 of 6 RESULTS
Ensure Integrity of your Software Supply Chain

How to fix software supply chain integrity with CIS Benchmarks and Aqua Security

Software (application) development lifecycle (SDLC) processes have followed the wild-west approach where security has been an afterthought to speedy delivery and race to market, however the recent supply chain attacks have more than highlighted the criticality and the need to ensure security is part of the design in the development and delivery process.

Aqua Securityย and CIS collaborate to publish industry’s first ever CIS Benchmarks framework guide for Supply Chain Security.

Why Rapid7 is the only security platform you need

Get complete coverage with Rapid7 security platform

The Rapid7 Platform difference means, you โ€˜the executive teamโ€™ can focus on the innovation and growth of your business without having to task your teams to become security ninjas and figure out the latest threats and vulnerabilities on their own while fighting fires.

REMEMBER: If you are not in the security business, donโ€™t make security your primary business!

InsightCloudSec IAM Access Explorer

IAM is the new security perimeter, guard it with Rapid7 insightCloudSec.

The perimeter has shifted in the cloud where IAM policies is all that sits between the outside world and cloud resources critical to your business.

In this article I share how organisations can use DivvyCloud’s Access Explorer to gain visibility into IAM policies, drive remediation and reporting. Enjoy!

Rapid7 InsightCloudSec CSPM solution

Cloud Security Posture and Compliance with Rapid7 insightCloudSec

A consolidated view of multi cloud environments is no longer a ‘nice to have’ as the enemies in this cyber warfare are often invisible.

In this article I share how organisations can use DivvyCloud to protect themselves against mis-configurations, policy violations and other threats. Enjoy!

Dns Filtering Cyber Security Header

Keeping cyber-criminals at bay with DNS filtering

With cybercrime becoming a mainstream source of revenue for criminal organisation and individuals across the globe, cyber-attacks are a daily occurrence. It’s only a matter for time before you are compromised.

In this article, I share how to boost your security posture against cyber attacks within minutes for free. Enjoy!

Password Security Manager Header image

How secure is your password?

You are just one bad password away from unwanted access to your information. Once they have access to your information, they have access to your digital identity i.e. basically, your life. Protecting yourself starts with good password hygiene.

In this article I share a life hack that you can use to ensure your passwords cannot be cracked in your lifetime. Enjoy!