Recent Posts

Announcing our official partnership with Sumo Logic!

The CloudPassage Halo platform just got even better thanks to a new partnership with Sumo Logic, the leading cloud-native, machine data analytics platform. With this partnership, IT Ops, DevOps, and security teams can now share a comprehensive, near-real-time view of…

Read More

The cybersecurity skills gap shows no signs of closing

It starts at the university level and spreads outward. As we reported just last month, students are continuing to graduate with computer science degrees from top universities, but with little knowledge of cybersecurity. For the most part, cybersecurity courses continue…

Read More

Introduction to Software Vulnerability Assessment

CloudPassage Halo’s Software Vulnerability Assessment module (SVA), is one of the most critical components of the Halo platform. The SVA module regularly scans all of your protected servers to detect known vulnerable packages, providing universal visibility into your workloads. These…

Read More

Catch our speaking session at Jenkins World!

We love DevOps at CloudPassage. Consequently we’re thrilled to report that one of our own DevOps experts and CloudPassage platform architect, Adam Keller, will be speaking at Jenkins World, a Global DevOps Event today! Read below for details about Adam’s…

Read More

Security considerations for container security

Containers are exploding in popularity because they’re fast and efficient. While security is just as important as it is for virtual machines, securing containers requires a different approach. Because containers run on a shared host and typically use multiple components…

Read More

CloudPassage is a winner of the 2017 Stratus Award!

The Business Intelligence Group recently announced that CloudPassage has won a 2017 Stratus Award in their annual contest. Each year the organization seeks out the companies that offer superior performance and unique solutions within cloud technologies. “The entire CloudPassage team…

Read More

The social side of hacking

Perhaps one of the most devious forms of phishing is social engineering, or the gleaning of critical information about individuals or organizations through social media, email, or other social interactions. In fact, the most recent global cyber infections – WannaCry…

Read More