Recent Posts

Best Practices for Securing Azure Compute

Cloud computing delivered through services like Microsoft Azure, and AWS, have delivered a bevy of benefits for enterprise IT. Among the most significant is the ability to quickly provision computing resources without major upfront investment or need for building on-premise…

Read More

Test Drive CloudPassage Halo Cloud Security Platform

Evaluating a new cloud security solution can take a lot of time and effort, including the hassle of setting up a test environment. Our CloudPassage Halo sandbox makes it easy, by letting you test our solution in a pre-built environment…

Read More

Halo Wins 5-Star Rating from SC Magazine

CloudPassage is proud to announce that its Halo security platform was honored by SC Magazine with a 5-Star Rating (out of five stars) in its latest SC Labs product review. CloudPassage Halo won perfect 5-Star Ratings in all categories: Features,…

Read More

Secure Your Azure Deployments With Cloud Secure

Consumption of public cloud infrastructure services continues to increase, requiring security teams to maintain a comprehensive and up-to-date inventory of cloud assets in-use across multiple environments, such as Azure and AWS, throughout their enterprise. According to 451 Group, 69 percent…

Read More

Top 5 Benefits of Public Cloud Computing Versus Traditional IT

This is part 2 of our two-part series on the benefits of public cloud computing, or Infrastructure as a Service (IaaS), versus traditional IT. Long before cloud computing, traditional IT infrastructure was great for enterprises that needed to run many…

Read More

Harness the Power of IaaS Without Compromising Security

This is the first of a two part series on the benefits of infrastructure-as-a-service (IaaS). Enterprises struggle to control costs and stay competitive – they face increasing demands to keep pace with requirements for data storage and protection, ever-changing regulations,…

Read More

Benefits of Serverless Computing

Many organizations are in a transition, operating somewhere between traditional and modern application environments, and asking some of the same questions you likely have about how serverless computing environments work. Most companies are not actually 100% serverless, or even 100%…

Read More

New: Weekly Halo Cloud Secure Demos

The New Year is a time to celebrate new beginnings. Starting over with a clean slate of resolutions, goals, launches, etc. That’s the good news. Now here’s the bad: If you thought 2018 was a tough year for data breaches,…

Read More

Best Practices for Securing AWS Lambda

We’re hearing more and more about services that are not based on traditional server models, such as Amazon S3 buckets—basically big buckets of storage in the cloud, and the concept of serverless computing. The good thing about what are now…

Read More

5 Common DNS Attacks

The Domain Name System (DNS) security directly impacts both end users and service providers, as the system’s critical nature makes it a sought-after target for those attempting to compromise or disrupt Internet services via DNS attacks.   DNS is the…

Read More