Top 5 Benefits of Public Cloud Computing Versus Traditional IT

This is part 2 of our two-part series on the benefits of public cloud computing, or Infrastructure as a Service (IaaS), versus traditional IT. Long before cloud computing, traditional IT infrastructure was great for enterprises that needed to run many…

Read More

Harness the Power of IaaS Without Compromising Security

This is the first of a two part series on the benefits of infrastructure-as-a-service (IaaS). Enterprises struggle to control costs and stay competitive – they face increasing demands to keep pace with requirements for data storage and protection, ever-changing regulations,…

Read More

Benefits of Serverless Computing

Many organizations are in a transition, operating somewhere between traditional and modern application environments, and asking some of the same questions you likely have about how serverless computing environments work. Most companies are not actually 100% serverless, or even 100%…

Read More

New: Weekly Halo Cloud Secure Demos

The New Year is a time to celebrate new beginnings. Starting over with a clean slate of resolutions, goals, launches, etc. That’s the good news. Now here’s the bad: If you thought 2018 was a tough year for data breaches,…

Read More

Best Practices for Securing AWS Lambda

We’re hearing more and more about services that are not based on traditional server models, such as Amazon S3 buckets—basically big buckets of storage in the cloud, and the concept of serverless computing. The good thing about what are now…

Read More

5 Common DNS Attacks

The Domain Name System (DNS) security directly impacts both end users and service providers, as the system’s critical nature makes it a sought-after target for those attempting to compromise or disrupt Internet services via DNS attacks.   DNS is the…

Read More

Mitigating the First Major Kubernetes Vulnerability

Recent news on the discovery of the first Kubernetes vulnerability, the popular cloud container orchestrations system, highlights two things critical to security, the need to: Audit and harden systems on the periphery and inside an infrastructure, and    Continually review these…

Read More

Tips for a Successful AWS re:Invent 2018

AWS re:invent is less than a month away, but if you’re like most IT and security professionals you have your hands full. This year we’re sharing some tips for AWS re:Invent that will help you take advantage of great online…

Read More

Best Practices for Securing Amazon EC2

As enterprises move applications from traditional data centers to a public or hybrid cloud , their legacy security model also needs to change to support the new environment. For example, in the Amazon Web Services (AWS) environment, AWS is responsible…

Read More