
Augment Microsoft Defender for Cloud with Mondoo Exposure Management
What do you get when you combine Microsoft Defender for Cloud (MDC) with the contextual risk prioritization and vulnerability and misconfiguration detection of Mondoo’s exposure management platform? The answer: A complete, centralized, and actionable list of all the misconfigurations and vulnerabilities in your environment—prioritized by the actual risk they pose to your organization.

Continuous Domain Health Checking and Compliance
Over the last decade, we’ve seen an explosion in the complexity of attacks on business infrastructure. New zero-day attacks and ransomware breaches have become weekly news topics. Businesses have reacted with new security practices and tooling meant to thwart attackers, but in the pursuit of cutting-edge defenses, have we missed the most basic part of securing business infrastructure? Attackers don’t need complex, zero-day exploits to compromise your business if your web properties and domains are not properly secured.

GCP Security from CSPM to Agentless VM Scanning
The shift from traditional data centers to the cloud has changed how we provision systems. Gone are the days of waiting for vendors, painstakingly slow rack and stack processes, and manual OS installations. Today, you can launch new systems into production within minutes using a few clicks or API calls. While this has increased convenience and agility, it has also introduced significant challenges for security teams that even modern Cloud Security Posture Management (CSPM) solutions often miss.

Whats new in CIS Amazon Web Services Foundations 2.0
The Center for Internet Security (CIS) recently released an updated 2.0 version of their Amazon Web Services (AWS) Foundations benchmark. This updated release ships with several significant changes, including new security recommendations and the removal of outdated practices.

Mondoo supports Oracle Cloud Infrastructure for enhanced IT security
We're excited to announce that Mondoo now extends its robust security and compliance solution to Oracle Cloud Infrastructure (OCI). This integration quickly and easily connects Mondoo’s comprehensive security solution to OCI in minutes. OCI customers can use Mondoo’s tools to find, prioritize, and fix security risks in their cloud workloads.

Effortless and Continuous Azure VM Instance Scanning
The shift from traditional data centers to the cloud has changed how we provision systems. Gone are the days of waiting for vendors, painstakingly slow rack and stack processes, and manual OS installations. Today, new systems can be launched into production within minutes using a few clicks or API calls. While this has increased convenience and agility, it has also introduced significant challenges for security teams.

Secure Your SaaS Applications with Mondoo's Open SSPM Solution
The modern business landscape is evolving rapidly, with more and more organizations shifting their processes, user data, corporate data, and customer relationship management (CRM) solutions to SaaS applications.

SSL/TLS Certificate Verification: How to Identify Expired Certificates
Verifying SSL/TLS certificates and establishing effective certificate management in your environment can be challenging. With cnquery's cloud-native asset inventory capabilities, you can retrieve all information about your deployed certificates and their certificate chain across your entire infrastructure. With cnspec's cloud-native solution to assess the security and compliance, you can enforce that your certificates and their certificate chain are verified as well as not expired all the time.

Finding Lost AWS Resources with cnquery
We all understand that resources get lost in the cloud. Between working across regions, migrating accounts, and the ability to quickly spin up an instance and forget about it, it’s almost inevitable to have some mystery resources lurking in your AWS account.

Side Scanning EC2 Instances with cnspec
Just when you think you can’t have it all, you can.

Reveal Vulnerabilities in AWS EC2 Instances with cnspec
Vulnerabilities are bad. We all know this. They expose your infrastructure to attackers.

9 AWS Security Mistakes for DevOps Teams
AWS introduces new complexity to your infrastructure. With that complexity comes potential security risk to the organization. Amazon’s shared responsibility model places the reality of security within the cloud squarely in the hands of the DevOps team
Ready to Transform Your Security?
See how Mondoo can help you find and fix vulnerabilities faster.