Now available to all Halo users: Cortex v1.1

We’ve just released Cortex v1.1 (https://github.com/cloudpassage/cortex), and while some changes may seem subtle, they greatly improve the functionality and efficiency of Cortex, giving you an even more seamless experience. Some of the changes you’ll see include: File-based configuration for scheduled…

Read More

Securing Jenkins – Fast

Jenkins is one of the most popular open source Continuous Integration (CI) tools available. It’s extremely flexible, easy to use, and it performs a critical function in many agile development situations. Using Jenkins for CI allows developers and DevOps personnel…

Read More

LIDS cross site scripting (XSS) for attack detection

Cross Site Scripting (XSS) is one of the most common application security vulnerabilities and it affects many web applications. XSS attacks occur when an attacker uses a web application to send malicious code (generally in the form of a browser…

Read More

Proactive versus reactive vulnerability management

A career in information security is a trial by fire, one I dove into headfirst when I began career 18 years ago. Challenging problems reared their ugly heads through attacks like NIMDA, CodeRed, SQLSlammer and others. These viruses took advantage…

Read More

Leveraging LIDS – logs and lots more

When it comes to a Log-Based Intrusion Detection System (or LIDS), there’s a lot you can leverage. LIDS is a useful cross-platform, tactical, and supplemental (if you have an existing SIEM) pattern matching system. You can use LIDS to set…

Read More

Introduction to Software Vulnerability Assessment

CloudPassage Halo’s Software Vulnerability Assessment module (SVA), is one of the most critical components of the Halo platform. The SVA module regularly scans all of your protected servers to detect known vulnerable packages, providing universal visibility into your workloads. These…

Read More

Configuration security monitoring with Halo

After taking a brief hiatus, it’s time to return to another segment of Halo explainer videos! This week we’re diving into CSM, or the configuration security monitoring module in Halo. This module is integral to many of our security processes,…

Read More

How Halo can help detect cloud breaches

What happens to companies when they are using a public cloud infrastructure like AWS or Azure and hackers obtain login credentials to manage the cloud account? Three years ago, this happened to a company called Code Spaces. They went out…

Read More

Managing issues and policies within the new Halo interface

It’s time for the third and final installment of our series: explainer videos for the new Halo interface. This week we’re breaking down how to manage issues and policies within the new Halo interface. We’ve made some exciting changes so…

Read More