Webinar: Real DevSecOps for the security practitioner

While many companies have begun implementing DevOps into at least one, if not several departments, different approaches to DevOps have complicated the industry and have made many practitioners wonder if security will ever be able to keep up. In his…

Read More

Bringing security into the CICD pipeline with Halo

There’s a transformation happening in how IT is delivered in enterprises everywhere – what was once a predictable and stable IT environment has now become more fluid and is in a constant state of change. The average lifetime of a…

Read More

Quarantine your security concerns with this Halo Toolbox function

Guest Post by Richard Huffaker, http://www.richardsomething.com/about Cloud infrastructure and agile application delivery have been an incredible boon for many organizations, greatly increasing the speed of their deployment cycles and IT delivery processes. With this increase in speed, though, also comes…

Read More

Finding the Shellshock Vulnerability with CloudPassage Halo

A serious vulnerability, CVE-2014-6271, being variably referred to as Shellshock or Shellshocked, was just reported in the Bourne-Again Shell (bash) that affects most *NIX-based systems. Because the bash shell is so prevalent on *NIX systems, the vulnerability can be leveraged…

Read More

High Availability for Halo Event Connector

Today’s public cloud infrastructure is built on elasticity as a core value proposition which brings incredible benefits of being dynamic. However, failure is inevitable, occurs regularly, and often in unpredictable ways. To use a clichéd saying, the computing forecast for…

Read More

Aligning Cloud Security and RSA Archer GRC

Our integration team here at CloudPassage has worked very closely with the RSA Archer team to get certified with the RSA Ready Partner Program for our Halo Connector for Archer – something many of our larger enterprise customers have asked…

Read More

Incident containment in a cloud environment

As reported by WBALTV, Baltimore, Attorney General Eric Holder is calling on Congress to require companies to more quickly alert customers when their personal information is put at risk in cyber breaches. While there are some states that have notification…

Read More

Help with HIPAA Security Requirements

Citrix, a leader in virtualization, networking and cloud infrastructure, launched Citrix ShareFile for Healthcare but had a problem. Offering the healthcare industry the means to efficiently transfer protected health information as a Software-as-a-Service application had to comply with the Health…

Read More

Automate Discovery and Remediation of Heartbleed

As you probably have heard by now, Heartbleed is the name of a new critical vulnerability in OpenSSL, the de facto open source library used in many applications to implement SSL and TLS.  According to the Heartbleed website, a coding error…

Read More