Articles by 

Rilee Smith

Security

Shortening the Time Between Cloud Misconfigurations and Remediation

Most organizations will experience at least one cloud misconfiguration in the course of their digital transformation... it's not an IF, but a WHEN. Here's how to act quickly when they do happen so you can minimize the damage.
Security

Delivering AWS Cloud Insights “Up The Chain”

As heavy AWS cloud growth continues, both DevOps teams and leadership must find a way to achieve deep observability and create a unified, holistic view of their infrastructure that actually offers values to the entire business.
Learning

AWS Cloud Visibility vs. Observability... And Where Tenacity Fits In

Even visibility isn’t enough to get your hands around your AWS cloud environment these days. You need to go beyond visibility to observability.
News

Podcast: Chasing Certainty Is A Fool’s Errand with Foundations by Chris Decker

Tenacity's CTO, Nick Lumsden, joined the Foundations podcast to talk about how there is no way to completely get rid of risk... only to reduce it. And the only way to reduce your risk is to take action. Check out our recap of the conversation!
News

Webinar: How MSPs Can Nail Their Next Quarterly Business Review

Last week, Tenacity sat down with Lifecycle Insights to chat through how Managed Service Providers can deliver increased strategy and value around their public cloud services through QBRs. Here's what you missed.
Learning

The Sustainability of Public Cloud vs. On Prem Data Centers

What you may not realize if you are hosting your data in the public cloud vs. an on premises data center is that you’re already taking a huge step forward in making your organization more sustainable.
Learning

For Cloud Optimization, Begin With Better Tagging

One of the most effective means of streamlining costs in an AWS cloud environment is proper resource tagging. Here are some best practices to help you get started.
Security

The Ease of Exploiting AWS Cloud Misconfigurations

A security researcher decided to prove just how easy it was to find misconfigured assets on cloud services by leveraging pre-known network infrastructure to find live servers within reach. Here's what he discovered...
Product

How Tenacity Makes Reducing Cloud Waste Part of Your Routine

Tenacity automatically and instantly identifies underutilized or abandoned resources inside your cloud environment, helping to identify waste in real time. Here's a look at how we do it...
Learning

Translating Terminology from On-Prem Storage to the Public Cloud

Are you making the transition from traditional on-premises data storage to the public cloud? Here’s a deep-dive into the differences between terminology between on-prem and the most popular public cloud providers.
Compliance

How To Make Cloud Compliance Audits Way F-ing Easier

Cloud compliance audits don't have to suck. In this post, we're sharing our tips for automating the task of cloud compliance into your regular workflow so they're no big deal.
Learning

The Sustainability Argument For Smarter Cloud Cost Management

Nobody likes paying too much money for their cloud infrastructure. At Tenacity, we work with cloud-hosted organizations around the world to cut down on their cloud expenditure all while flagging cybersecurity risks — making your cloud footprint cheaper, safer, and greener.
Security

How Tenacity Helps Enforce CISA’s Guidance on Cloud Security Cyberattacks

Want to know how Tenacity stacks up against CISA's Russian cyberattack recommendations? Here are all the ways we've got you covered...plus other tips for keeping your cybersecurity efforts safe from malicious attacks.
Security

How to Enhance the Visibility of Public Cloud Misconfigurations

Cloud misconfigurations are some of the biggest challenges in cloud security today. Identifying and resolving these issues is a key way to achieve cloud security.
Product

It’s Time to Get a Grip on Your Cloud

Cloud security is full of chaos and confusion. Learn how Tenacity can help you Get a Grip on Your Cloud.™
Security

Why Foundational Security Should be at the Heart of Public Cloud Strategy

If you take the time up front to make sure that your foundational security is in place, you have a vastly reduced attack surface and a well-built infrastructure for your cybersecurity program.
Learning

Cybersecurity is Needlessly Complicated…on Purpose. Here’s Why.

As an outsider looking in, it feels impossible to get a grip on cloud security by yourself... and it was purposely built to feel that way. Let's break down why.
News

NashTech Event: How Startups Can Overcome The Limiting Factors in Cloud Security

Check out this recap of our NashTech Event and learn how startup organizations can break through the limiting factors of public cloud security and cost.
Product

Jira Integration: Take Action on your Public Cloud Violations

With Tenacity’s latest product update, users can now create Jira tickets directly within the platform to actionize issues and violations.
Security

2 Steps of Ransomware Protection That Organizations Often Forget

Analysts estimated that ransomware attacks occurred every 11 seconds in 2021, resulting in financial loss of up to $20 billion...
Savings

Creating a Cost-Conscious Culture that Reduces Public Cloud Spend

In 2021, 39% of organizations reported that they overspent their cloud budget. And that's not even the worst of it...
Product

Too Many Public Cloud Tools? We've Finally Found “The One” For You

Have you been fooling around in the cloud tools dating game for too long? It's time to quit swiping right, stop playing the field and settle down with “The One."
News

Webinar: Cloud Security 301 with Eureka Process

Tenacity’s CEO sits down with Eureka Process to talk about advanced security tools that will help you identify, track, and mitigate cloud security problems.
Product

Self Service: All The Power of Tenacity, No Meetings Required

Two clicks. Five minutes. Zero phone calls… meet Tenacity’s new Self Service feature.
Security

Why Cloud Security Needs to Start Left, Not Shift Left

To truly catch and fix misconfigurations, you don’t just need to "shift left" the responsibility to an earlier point in the line — each person must carry responsibility throughout the entire process.
Learning

Cloud Acronyms Got You Asking WTF?

Get a grip on your cloud acronyms.
Security

Why We Don’t Do Auto-Remediation… And Why You Don’t Want Us To

A look at the often untold dangers that come with giving tools auto-remediation privileges in your cloud environment.
News

Webinar: How To Improve Your Cybersecurity Posture On A Budget

Last week, we teamed up with our friends at Blumira to swap our best budget-saving tips for securing your public cloud environment. Here’s what you missed.
News

Podcast: Delivering Compliance at Scale with Tech & Main Presents

Tenacity's CEO, Jason Yaeger, joins the Tech & Main Presents podcast for a casual chat about delivering cloud compliance at scale, getting into the cybersecurity world, and the problems that Tenacity aims to solve.
Security

What Public Cloud Users Need To Know About The Log4j Vulnerability

CISA and cloud security experts alike have flagged the Log4j vulnerability as a ‘drop everything, call all vendors, re-task all developers, everything's on fire’ kind of issue that should be considered an immediate priority.

Rilee Smith

Director of Content Marketing

About me