Digital transformation requires security transformation

In 2018 digital transformation became a popular topic of discussion and exploration among enterprises. This year security transformation is becoming a key focus. Roughly nine out of 10 businesses surveyed in 2018 reported having or preparing to implement a formal…

Read More

8 ways to achieve agile security

Between 2017 and 2021, worldwide spending on cybersecurity will top $1 trillion, according to predictions from Cybersecurity Ventures. The barrage of cyberattacks on enterprises and new threat vectors within networks due to the move to Infrastructure as a Service (IaaS),…

Read More

5 Common DNS Attacks

The Domain Name System (DNS) security directly impacts both end users and service providers, as the system’s critical nature makes it a sought-after target for those attempting to compromise or disrupt Internet services via DNS attacks.   DNS is the…

Read More

Best Practices for Securing Amazon EC2

As enterprises move applications from traditional data centers to a public or hybrid cloud , their legacy security model also needs to change to support the new environment. For example, in the Amazon Web Services (AWS) environment, AWS is responsible…

Read More

Protecting Your Cloud-Based Relational Databases

As more enterprises move more sensitive data to the cloud, how you secure  and protect your public cloud services and resources is critical. While Amazon does a stellar job of securing the underlying server hardware and software as their part…

Read More

Creating a Culture of Cybersecurity

Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you…

Read More

F1000 Biotech Firm, Bio-Rad, Selects CloudPassage

Bio-Rad Laboratories, a $2.2B Life Sciences and Clinical Diagnostics leader whose history spans more than six decades will secure critical cloud assets with Halo Cloud Secure! Given the nature of Bio-Rad’s business, securing cloud assets in Microsoft Azure is a…

Read More

Security Best Practices for AWS CloudTrail

AWS CloudTrail captures a log of all API calls for an AWS account and its services. It also enables continuous monitoring and post-incident forensic investigations of AWS by providing an audit trail of all activities across your AWS infrastructure.  …

Read More

Halo Cloud Secure: Now available to everyone

Today we announce the general availability of Halo Cloud Secure, which offers comprehensive and continuous visibility across your public cloud infrastructure environments. According to The 2018 Cloud Security Report, 43% of cloud security professionals cite a lack of visibility into…

Read More