Recent Posts

Securing Your AWS IAM Cross-Account Roles and Service Roles

AWS Identity and Access Management (IAM) is a powerful service that helps you control access to AWS resources by enabling you to specify who and what is authenticated (signed in) and authorized (has permissions) to use those resources. Since IAM…

Read More

How to Discover Your S3 Bucket Exposures

For many, enterprises Amazon S3 buckets have been revolutionary, especially for those storing and distributing massive amounts of videos and photos. S3, or Simple Storage Service, is public cloud storage within Amazon Web Services (AWS). In a nutshell, they provide…

Read More

Halo Cloud Secure: Now available to everyone

Today we announce the general availability of Halo Cloud Secure, which offers comprehensive and continuous visibility across your public cloud infrastructure environments. According to The 2018 Cloud Security Report, 43% of cloud security professionals cite a lack of visibility into…

Read More

Gaining security visibility of your public cloud assets

As the use of public cloud services increases, security teams struggle to maintain visibility of their cloud assets. In fact, in one recent survey, 43% of cloud security pros said that lack of visibility into infrastructure security is their biggest…

Read More

Halo Cloud Secure: A unified product

Vitaliy Geraymovych, Talli Somekh, and I founded CloudPassage in 2010. In those early days, cloud infrastructure was broadly dismissed as little more than a hosting environment for games, blogs, and experiments. The bulk of IaaS offers revolved around cloud servers…

Read More

Now available to all Halo users: Cortex v1.1

We’ve just released Cortex v1.1 (https://github.com/cloudpassage/cortex), and while some changes may seem subtle, they greatly improve the functionality and efficiency of Cortex, giving you an even more seamless experience. Some of the changes you’ll see include: File-based configuration for scheduled…

Read More

Auditing Linux environments using LIDS and ‘auditd’

If you use LIDS at all, your life is about to get easier: Recently we released nine new templates for the CloudPassage Halo log-based intrusion detection system, (LIDS) which consists of different rules/policies for ‘auditd’. The CloudPassage Halo log-based intrusion…

Read More

Come see us at Gartner Security and Risk Management Summit!

We love that Gartner Security and Risk Management Summit. Year after year the summit continues to provide thought-provoking talks, enlightening conversations, and and important networking activities. This year we’re a sponsor, and we hope to see you there! Read on…

Read More