Recent Posts

Proactive versus reactive vulnerability management

A career in information security is a trial by fire, one I dove into headfirst when I began career 18 years ago. Challenging problems reared their ugly heads through attacks like NIMDA, CodeRed, SQLSlammer and others. These viruses took advantage…

Read More

Webinar: Five tips to secure Docker containers

We’ve got a new webinar coming out January 24th that you won’t want to miss; especially if your organization is implementing containers anytime soon. This five tips to secure Docker containers webinar builds off of a five container tips blog…

Read More

Will a new year bring new trends in cybersecurity?

2018 is already shaping up to be a busy year for the cybersecurity industry. Countries are looking to find a culprit for the WannaCry attacks, organizations who were the victims of cybercrimes in 2017 are working to prepare for fines,…

Read More

It’s 2018 and your Docker containers need to be secure

Linux Containers have existed since the mid 2000s but containers didn’t experience a surge in popularity until Docker burst onto the scene in 2013. And all it took was about year (according to the 2017 Docker Adoption survey by Datadog)…

Read More

Remote agent upgrades are here!

We are proud to announce the availability of remote agent upgrades for CloudPassage Halo! Special congratulations goes to the CloudPassage engineering team, who worked round-the-clock to ensure that this critical upgrade would be ready before the new year. With this…

Read More

2017 was a year of killer blogs!

It’s the end of the year and we’re feeling nostalgic at CloudPassage. Specifically, we’ve been looking back at year of great blogs and announcements we’ve had – 2017 was a year of impressive company growth. We launched Container Secure, an…

Read More

Network-Bound Disk Encryption in Red Hat Linux 7

As you likely know, using cloud services means that you’re storing data on servers you don’t own. Mistakes made in the cloud are therefore more likely to become public and the impact can range from embarrassment, to losing all of…

Read More

Jiu-jitsu in the cloud?!

I think of information security and jiu-jitsu in the same genre, just on different playing fields. When you start on your jiu-jitsu journey, you learn to move differently. Yes, you learn some offense movements but ultimately, the game is defense…

Read More

CloudPassage Puppet module achieves Partner Supported status

Earlier this year, we announced our partnership with Puppet and became one of the first partners to join Puppet’s Technology Alliance Partner Program (TAPP) and to develop a Partner Approved module. Now, we are excited to share that the CloudPassage…

Read More