Alexa, how easy is it to use the Halo API?

How long does it take to integrate the Halo API with an Amazon Echo? A little over a day if you’re Nick Lee, our senior solutions architect. But as Nick points out, the Halo REST API is so easy work with…

Read More

CloudPassage Halo now offered in solution-specific packages

Yesterday we announced new packaged offerings of CloudPassage Halo that more cost-effectively represent how enterprises use Halo for their server and cloud workload security. These packages can be purchased separately or in any combination in order to provide your organization…

Read More

Video: Overcoming cloud migration pain points (Black Hat 2016)

Guest blog by David Spark, Spark Media Solutions As enterprises jump to the cloud, they may think that it’s going to be business as usual. However, paradigms, architectures, and strategies that may have worked on-premise may not work as planned in the…

Read More

Why Old FIM Tools Fail In Agile IT Models

File integrity monitoring (or FIM) tools can be an important part of intrusion detection and configuration security. When combined with other tools, FIM gives you vital information about your servers for compliance and security. But too often these tools fall…

Read More

U.S. Universities Get “F” For Cybersecurity Education

In recent remarks by Commerce Secretary Penny Pritzker at Montgomery College, she noted that there are an “estimated 210,000 open and unfilled cybersecurity jobs in the United States today.” This is a remarkable statistic, but not all that surprising since most…

Read More