Configuration security monitoring with Halo

After taking a brief hiatus, it’s time to return to another segment of Halo explainer videos! This week we’re diving into CSM, or the configuration security monitoring module in Halo. This module is integral to many of our security processes,…

Read More

How Halo can help detect cloud breaches

What happens to companies when they are using a public cloud infrastructure like AWS or Azure and hackers obtain login credentials to manage the cloud account? Three years ago, this happened to a company called Code Spaces. They went out…

Read More

Managing issues and policies within the new Halo interface

It’s time for the third and final installment of our series: explainer videos for the new Halo interface. This week we’re breaking down how to manage issues and policies within the new Halo interface. We’ve made some exciting changes so…

Read More

How to protect yourself from WannaCry using CloudPassage Halo

Ransomware has been an issue since 2005, denying users access to their systems and files until a ransom is paid. Crypto-Ransomware that encrypts files on victim systems is the latest type. A new variant, called WannaCry, appeared starting on May…

Read More

Alexa, how easy is it to use the Halo API?

How long does it take to integrate the Halo API with an Amazon Echo? A little over a day if you’re Nick Lee, our senior solutions architect. But as Nick points out, the Halo REST API is so easy work with…

Read More

It’s your data: Halo Events Exporter

Our goal in everything we do here at CloudPassage is to make your life easier. Making your life harder would not only be pretty rude of us, it would also make it far less likely you or anyone else would…

Read More