Best Practices for Securing Amazon EC2

As enterprises move applications from traditional data centers to a public or hybrid cloud , their legacy security model also needs to change to support the new environment. For example, in the Amazon Web Services (AWS) environment, AWS is responsible…

Read More

Protecting Your Cloud-Based Relational Databases

As more enterprises move more sensitive data to the cloud, how you secure  and protect your public cloud services and resources is critical. While Amazon does a stellar job of securing the underlying server hardware and software as their part…

Read More

Creating a Culture of Cybersecurity

Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you…

Read More

Securing Your AWS Virtual Private Cloud

Amazon Web Services provides highly secure on-demand cloud computing services that serve as the building blocks you need to quickly start developing applications and deploy them to the cloud. AWS Virtual Public Cloud (VPC) makes it easier for you to…

Read More

F1000 Biotech Firm, Bio-Rad, Selects CloudPassage

Bio-Rad Laboratories, a $2.2B Life Sciences and Clinical Diagnostics leader whose history spans more than six decades will secure critical cloud assets with Halo Cloud Secure! Given the nature of Bio-Rad’s business, securing cloud assets in Microsoft Azure is a…

Read More

Security Best Practices for AWS CloudTrail

AWS CloudTrail captures a log of all API calls for an AWS account and its services. It also enables continuous monitoring and post-incident forensic investigations of AWS by providing an audit trail of all activities across your AWS infrastructure.  …

Read More

Why CMOs Should Care About Cybersecurity

Everyone from Deloitte to Ad Age to Forbes and many more are talking about why CMOs should care about cybersecurity and become more involved in the overall strategy. That makes sense as security moves beyond the purview of IT and…

Read More

CloudPassage a Cybersecurity Distinguished Vendor

This has been the year of cybersecurity, or one of data breaches. Depending on where you stand. In any case, it’s been a busy year for the cybersecurity industry and for companies trying to lock down their cloud security strategies….

Read More

Securing Your AWS IAM Cross-Account Roles and Service Roles

AWS Identity and Access Management (IAM) is a powerful service that helps you control access to AWS resources by enabling you to specify who and what is authenticated (signed in) and authorized (has permissions) to use those resources. Since IAM…

Read More

How to Discover Your S3 Bucket Exposures

For many, enterprises Amazon S3 buckets have been revolutionary, especially for those storing and distributing massive amounts of videos and photos. S3, or Simple Storage Service, is public cloud storage within Amazon Web Services (AWS). In a nutshell, they provide…

Read More