Keep up with the latest news!
Subscribe to our blog to get up to date cloud management and automation news, tips and tricks, company announcements, product alerts, and more.
LATEST POSTS
Advanced Techniques for Defending AWS ExternalID and Cross-Account AssumeRole Access
Advanced Techniques for Defending AWS ExternalIDs and Cross-Account AssumeRole Access Last month Kesten Broughton at Praetorian Security released some great research on third party cloud security products using Amazon’s preferred cross-account connection technique -
AWS Security Management with SecurityHub
AWS Security Management with SecurityHub Security has been a top concern with cloud adoption since its inception and as a result, security has been a top concern of cloud vendors as well. To help customers
Easy Does It – Understanding Object Storage Public Data Exposure
Easy Does It — Understanding Object Storage Public Data Exposure One thing I’d like to avoid in narrating this journey through common Cloud Attack Killchains is the implication that cloud platform providers are doing
NEWS & PRESS
![]() |
DisruptOps Raises $9M Series A to Scale Cloud Security Operations March 10, 2020 KC Business Journal |
![]() |
KC tech startup CEO: Raising $9M Series A means employee growth March 10, 2020 KC Business Journal |
![]() |
DisruptOps raises $9M Series A with serial entrepreneur, cyber security veterans taming the cloud March 10, 2020 Startland News |
![]() |
DisruptOps Raises $9M Series A to Scale Cloud Security Operations March 10, 2020 ePRNews |
![]() |
New partner integrations available for AWS Security Hub November 25, 2019 Amazon Web Services |
![]() |
Cybersecurity Firm Imperva Discloses Breach August 27, 2019 KrebsOnSecurity |
![]() |
What We Can Learn from the Capital One Hack August 2, 2019 KrebsOnSecurity |
![]() |
Do DevSecOps with AWS to Practice Cybersecurity Vigilance July 12, 2019 Eweek |
![]() |
RSAC 2019 Showcases Entrepreneurs Securing Our New World March 27, 2019 Eweek |
![]() |
DevOps Chat: DisruptOps: SecurityOps, Disrupted – RSAC Edition February 12, 2019 Security Boulevard |
![]() |
DisruptOps Selected as Finalist for 2019 RSA Conference Innovation Sandbox Contest February 5, 2019 RSA |
![]() |
DisruptOps Aims to Improve Cloud Security With Guardrails October 18, 2018 eWeek |
![]() |
DisruptOps Introduces Cloud Management Platform for Automated Security and Operations October 17, 2018 Newswire |
![]() |
DevOps Chat: Disrupt:Ops Brings Security Closer to DevOps October 17, 2018 DevOps.com |
![]() |
DisruptOps Aims to Automate Cloud Security October 17, 2018 Decipher |
![]() |
Startup Spun Out of Securosis Secures $2.5 Million Seed Investment October 17, 2018 Dark Reading |
![]() |
FireMon co-founder’s new startup targets a $4B-plus market October 17, 2018 Kansas City Business Journal |
![]() |
Building Great Cloud Security Guardrails October 17, 2018 DevOps.com |
BLOG
SSRF Defense Step 1: Protect Data Storage Targets
SSRF Defense Step 1: Protect Data Storage Targets In previous posts Rich Mogull discussed using IAM Roles to break the attacker kill chain in AWS. We are excited to announce that DisruptOps now supports guardrails to automatically ensure you’re not
Yes, Finding Public S3 Buckets is Automated and Easy
Yes, Finding Public S3 Buckets Is Automated and Easy Attackers are automating the discovery of public AWS S3 buckets. Are you automating your security defense? We found a list of over 60,000 public S3 buckets. Verdict (a UK-based tech journal)
RDP Scanning in AWS
AWS RDP Scanning I came across a great post from Joseph Wood at HP last week, on the recent dramatic increase in RDP scanning in AWS -- specifically scanning of the RDP port. Down in the comments someone asked, “Why anyone
What You Need to Know About AWS Security Monitoring, Logging, and Alerting
What You Need to Know About AWS Security Monitoring, Logging, and Alerting In terms of AWS security, first the good news: Amazon Web Services offers an impressive collection of security monitoring and logging capabilities. Now the bad news: these
Preventing the Next CapitalOne Cloud Breach
Configuration mistakes. This is not a new issue. IT and Security Operations teams have been struggling with managing configurations for as long as they have existed. As organizations start down the cloud path, the problem becomes more acute. There are simply too
Breaking Attacker Kill Chains in AWS: IAM Roles
Over the past year I’ve seen a huge uptick in interest for concrete advice on handling security incidents inside the cloud, with cloud native techniques. As organizations move their production workloads to the cloud, it doesn’t take long