Recent Posts

CloudPassage is going to Black Hat! Are you?

From July 30-August 4, we will be at the Black Hat conference in Las Vegas as a Platinum sponsor. Throughout the week, we will be headlining and attending a number of activities. We’d love to see you there! Attend our…

Read More

How microsegmentation helps with compliance

Guest post by Matthew Pascucci, Frontline Sentinel In our last article on microsegmentation, we spoke about the security use-case. The security use-case is the linchpin to all other use cases for microsegmentation. It is the founding case that will spawn…

Read More

How microsegmentation helps with security

Guest post by Matthew Pascucci, Frontline Sentinel There are many uses for microsegmentation, which we spoke about in our last article, but the first use case we’re going dig into more is: security. This is the most popular use case…

Read More

How Halo can help combat the BadTunnel vulnerability

Last week, Microsoft released several patches to address a vulnerability nicknamed “BadTunnel” that reportedly affects all versions (Desktop and Server) of Windows OS. At a glance, BadTunnel is a vulnerability that, if exploited, could allow an attacker to hijack a victim’s…

Read More

Why you need microsegmentation

Guest post by Matthew Pascucci, Frontline Sentinel One of the golden rules of security is to use proper segmentation in a network to protect your assets. It’s brought up in compliance standards, security best practices and by almost every security…

Read More

Drivers for organizations to adopt and embrace agile security

Cyber threats against enterprises continue to rise, as more people are connected to the Internet, the criminal underworld continues to grow and mature, and state-sponsored attacks are on the rise. Regulations of cyber security continue to grow. And IT organizations…

Read More

Survey results: 2016 Cloud Security Spotlight report

On Tuesday we announced results of the 2016 Cloud Security Spotlight report, which gathered intel from more than 300,000 members of the Information Security Community on LinkedIn. Participants in the survey were professionals from a broad range of organizations and questions…

Read More

How Halo can help with the ImageMagick vulnerability

Last week, a serious vulnerability, CVE-2016-3714, was announced in ImageMagick, software commonly used on websites to manipulate images. The vulnerability was discovered on *NIX-based operating systems. The vulnerability, nicknamed ImageTragick, could potentially allow Remote Code Execution (RCE) if the server…

Read More