Recent Posts

When it comes to cyber attacks, NATO means business

Here’s something a little scary to think about: NATO’s Secretary General, Jens Stoltenberg, said last month that a massive cyber attack could trigger Article 5 of the organization’s treaty. For those of you blissfully unaware of the ins and outs…

Read More

Come see us at Black Hat!

Black Hat is fast approaching and we could not be more excited! We have some great partnerships to discuss, a major overhaul of our processing grid to show off, and a Halo Rover hoverboard to give away. Our theme is…

Read More

Why it’s important to comply with PCI

PCI Compliance is not just a fantastic way for your Director of Operations to sound important in meetings. It’s also key to ensuring all of your customer payment data is secured from attack. Beyond the fact that inadvertently exposing customer…

Read More

Using Intel’s Optane SSD storage to dive into Docker’s layers

Background: Containerization is a rapidly growing trend in application hosting infrastructure. There are a number of guiding principles and best practices for building container images (containerization’s analog for virtual-machine images). One guiding principle of containerization is building small, concise, single-concern…

Read More

Learn all about automated compliance in our latest webinar

At this point, nearly every organization is held to some sort of compliance standard. Where there are customers, there are security specialists working on protecting their data in order to stay within compliance. And while most organizations agree that it’s…

Read More

Petya / GoldenEye is spreading. Here’s how Halo can help.

The latest wave of ransomware, Petya/GoldenEye, started hitting Ukraine, Russia and western Europe earlier today and has already brought down critical infrastructure. Among those confirmed as impacted are Kiev’s main airport and metro system, Ukraine’s state power company, and several…

Read More

Configuration security monitoring with Halo

After taking a brief hiatus, it’s time to return to another segment of Halo explainer videos! This week we’re diving into CSM, or the configuration security monitoring module in Halo. This module is integral to many of our security processes,…

Read More

How Halo can help detect cloud breaches

What happens to companies when they are using a public cloud infrastructure like AWS or Azure and hackers obtain login credentials to manage the cloud account? Three years ago, this happened to a company called Code Spaces. They went out…

Read More

Do more CISOs mean a greater focus on security concerns?

In early 2016 the percentage of enterprise organizations with Chief Information Security Officers (CISOs) in their C-Suites stood at 50%. In early 2017 that number has already leapt to 65%, representing a 30% increase in just a single year. This…

Read More