Using Opscompass to Streamline and Simplify FedRAMP compliance monitoring for Amazon RDS
Ensure FedRAMP compliance for Amazon RDS with Opscompass. Monitor configurations, detect risks, and maintain security across your cloud.
Using OpsCompass CLI to Detect Changes Made Outside of Terraform
Using OpsCompass with Terraform plan helps close the visibility gap in IAC driven environments allowing you to find problems faster.
The State of Cloud Security – Insights from Thomas Jung
This article is part of our new State of Cloud Security 2021 Series which will interview a diverse mix of cloud security experts, design-makers, and practitioners with a goal of
The State of Cloud Security – Jamie Orlando, Nutfield Security
This article is part of our new State of Cloud Security 2021 Series which will interview a diverse mix of cloud security experts, design-makers, and practitioners with a goal of
Expanding our Industry Leading Risk Management Solutions
As recognized by Gartner, OpsCompass is one of the industry’s leading providers of Cloud Security Posture Management (CSPM) solutions. CSPM is vital for organizations deploying their applications to the cloud
The State of Cloud Security — Insights From Raj Meka, CEO of Mekas Cloud Services
State of Cloud Security 2021
Cloud adoption was already well underway prior to COVID-19 but the pandemic accelerated adoption faster than anyone could have ever anticipated.
5 Best Practices for Securing Microsoft Azure
Cloud adoption has led to a major shift in application security management. Unlike on-premises where the focus is more on perimeter security, cloud deployments demand a more holistic and integrated
Why Managing Configuration Drift is Critical in the Cloud
Identifying and Managing Drift is Vital to Your Organization’s Success What is Configuration Drift Organizations have been working to alleviate misconfigurations in their environments for as long as developers have
The Changing State of Configuration Drift
How Configuration Drift Management Tools Have Evolved Over Time For as long as developers have been writing software, they have typically allowed the user to customize configuration. Often, these configuration