Why CMOs Should Care About Cybersecurity

Everyone from Deloitte to Ad Age to Forbes and many more are talking about why CMOs should care about cybersecurity and become more involved in the overall strategy. That makes sense as security moves beyond the purview of IT and…

Read More

CloudPassage a Cybersecurity Distinguished Vendor

This has been the year of cybersecurity, or one of data breaches. Depending on where you stand. In any case, it’s been a busy year for the cybersecurity industry and for companies trying to lock down their cloud security strategies….

Read More

Securing Your AWS IAM Cross-Account Roles and Service Roles

AWS Identity and Access Management (IAM) is a powerful service that helps you control access to AWS resources by enabling you to specify who and what is authenticated (signed in) and authorized (has permissions) to use those resources. Since IAM…

Read More

How to Discover Your S3 Bucket Exposures

For many, enterprises Amazon S3 buckets have been revolutionary, especially for those storing and distributing massive amounts of videos and photos. S3, or Simple Storage Service, is public cloud storage within Amazon Web Services (AWS). In a nutshell, they provide…

Read More

Come see us at Gartner Security and Risk Management Summit!

We love that Gartner Security and Risk Management Summit. Year after year the summit continues to provide thought-provoking talks, enlightening conversations, and and important networking activities. This year we’re a sponsor, and we hope to see you there! Read on…

Read More

Do more CISOs mean a greater focus on security concerns?

In early 2016 the percentage of enterprise organizations with Chief Information Security Officers (CISOs) in their C-Suites stood at 50%. In early 2017 that number has already leapt to 65%, representing a 30% increase in just a single year. This…

Read More

Video: Cloud security: don’t harden infrastructure, follow data

Guest blog by David Spark, Spark Media Solutions “Hardening the cloud is a really difficult conversation for someone to have that doesn’t own the infrastructure,” said John Pironti (@jpironti), president, IP Architects, in our conversation at the Black Hat USA…

Read More

Video: There is no time for security (Black Hat 2016)

Guest blog by David Spark, Spark Media Solutions “There’s less and less separation between building out the application and building out the infrastructure. Security has to be built in. It has to be automated. It’s no longer something we deploy…

Read More