Best Practices for Securing Amazon EC2

As enterprises move applications from traditional data centers to a public or hybrid cloud , their legacy security model also needs to change to support the new environment. For example, in the Amazon Web Services (AWS) environment, AWS is responsible…

Read More

Protecting Your Cloud-Based Relational Databases

As more enterprises move more sensitive data to the cloud, how you secure  and protect your public cloud services and resources is critical. While Amazon does a stellar job of securing the underlying server hardware and software as their part…

Read More

Creating a Culture of Cybersecurity

Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you…

Read More

Securing Your AWS Virtual Private Cloud

Amazon Web Services provides highly secure on-demand cloud computing services that serve as the building blocks you need to quickly start developing applications and deploy them to the cloud. AWS Virtual Public Cloud (VPC) makes it easier for you to…

Read More

F1000 Biotech Firm, Bio-Rad, Selects CloudPassage

Bio-Rad Laboratories, a $2.2B Life Sciences and Clinical Diagnostics leader whose history spans more than six decades will secure critical cloud assets with Halo Cloud Secure! Given the nature of Bio-Rad’s business, securing cloud assets in Microsoft Azure is a…

Read More

Security Best Practices for AWS CloudTrail

AWS CloudTrail captures a log of all API calls for an AWS account and its services. It also enables continuous monitoring and post-incident forensic investigations of AWS by providing an audit trail of all activities across your AWS infrastructure.  …

Read More

Securing Your AWS IAM Cross-Account Roles and Service Roles

AWS Identity and Access Management (IAM) is a powerful service that helps you control access to AWS resources by enabling you to specify who and what is authenticated (signed in) and authorized (has permissions) to use those resources. Since IAM…

Read More

How to Discover Your S3 Bucket Exposures

For many, enterprises Amazon S3 buckets have been revolutionary, especially for those storing and distributing massive amounts of videos and photos. S3, or Simple Storage Service, is public cloud storage within Amazon Web Services (AWS). In a nutshell, they provide…

Read More

Halo Cloud Secure: Now available to everyone

Today we announce the general availability of Halo Cloud Secure, which offers comprehensive and continuous visibility across your public cloud infrastructure environments. According to The 2018 Cloud Security Report, 43% of cloud security professionals cite a lack of visibility into…

Read More

Gaining security visibility of your public cloud assets

As the use of public cloud services increases, security teams struggle to maintain visibility of their cloud assets. In fact, in one recent survey, 43% of cloud security pros said that lack of visibility into infrastructure security is their biggest…

Read More