Best Practices for Securing Amazon EC2

As enterprises move applications from traditional data centers to a public or hybrid cloud , their legacy security model also needs to change to support the new environment. For example, in the Amazon Web Services (AWS) environment, AWS is responsible…

Read More

Protecting Your Cloud-Based Relational Databases

As more enterprises move more sensitive data to the cloud, how you secure  and protect your public cloud services and resources is critical. While Amazon does a stellar job of securing the underlying server hardware and software as their part…

Read More

Creating a Culture of Cybersecurity

Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you…

Read More

F1000 Biotech Firm, Bio-Rad, Selects CloudPassage

Bio-Rad Laboratories, a $2.2B Life Sciences and Clinical Diagnostics leader whose history spans more than six decades will secure critical cloud assets with Halo Cloud Secure! Given the nature of Bio-Rad’s business, securing cloud assets in Microsoft Azure is a…

Read More

Security Best Practices for AWS CloudTrail

AWS CloudTrail captures a log of all API calls for an AWS account and its services. It also enables continuous monitoring and post-incident forensic investigations of AWS by providing an audit trail of all activities across your AWS infrastructure.  …

Read More

Halo Cloud Secure: Now available to everyone

Today we announce the general availability of Halo Cloud Secure, which offers comprehensive and continuous visibility across your public cloud infrastructure environments. According to The 2018 Cloud Security Report, 43% of cloud security professionals cite a lack of visibility into…

Read More

Gaining security visibility of your public cloud assets

As the use of public cloud services increases, security teams struggle to maintain visibility of their cloud assets. In fact, in one recent survey, 43% of cloud security pros said that lack of visibility into infrastructure security is their biggest…

Read More

Halo Cloud Secure: A unified product

Vitaliy Geraymovych, Talli Somekh, and I founded CloudPassage in 2010. In those early days, cloud infrastructure was broadly dismissed as little more than a hosting environment for games, blogs, and experiments. The bulk of IaaS offers revolved around cloud servers…

Read More

Now available to all Halo users: Cortex v1.1

We’ve just released Cortex v1.1 (https://github.com/cloudpassage/cortex), and while some changes may seem subtle, they greatly improve the functionality and efficiency of Cortex, giving you an even more seamless experience. Some of the changes you’ll see include: File-based configuration for scheduled…

Read More

Auditing Linux environments using LIDS and ‘auditd’

If you use LIDS at all, your life is about to get easier: Recently we released nine new templates for the CloudPassage Halo log-based intrusion detection system, (LIDS) which consists of different rules/policies for ‘auditd’. The CloudPassage Halo log-based intrusion…

Read More