Digital transformation requires security transformation

In 2018 digital transformation became a popular topic of discussion and exploration among enterprises. This year security transformation is becoming a key focus. Roughly nine out of 10 businesses surveyed in 2018 reported having or preparing to implement a formal…

Read More

Cloud requires new approach to security and compliance

Public cloud, or Infrastructure as a Service (IaaS), offers an enhanced level of flexibility and scalability with its on-demand unlimited virtual space and abundant server resources. Though as more enterprises rush to reap the benefits of the cloud, they’re facing…

Read More

Best practices for securing your Azure SQL

Azure SQL enables you to maintain the security, integrity and consistency of your data, which is critical when customer information is at stake, but it requires using a new approach to security. In Azure, you can have your SQL Server…

Read More

Halo Wins 5-Star Rating from SC Magazine

CloudPassage is proud to announce that its Halo security platform was honored by SC Magazine with a 5-Star Rating (out of five stars) in its latest SC Labs product review. CloudPassage Halo won perfect 5-Star Ratings in all categories: Features,…

Read More

Best Practices for Securing AWS Lambda

We’re hearing more and more about services that are not based on traditional server models, such as Amazon S3 buckets—basically big buckets of storage in the cloud, and the concept of serverless computing. The good thing about what are now…

Read More

5 Common DNS Attacks

The Domain Name System (DNS) security directly impacts both end users and service providers, as the system’s critical nature makes it a sought-after target for those attempting to compromise or disrupt Internet services via DNS attacks.   DNS is the…

Read More

Mitigating the First Major Kubernetes Vulnerability

Recent news on the discovery of the first Kubernetes vulnerability, the popular cloud container orchestrations system, highlights two things critical to security, the need to: Audit and harden systems on the periphery and inside an infrastructure, and    Continually review these…

Read More

Tips for a Successful AWS re:Invent 2018

AWS re:invent is less than a month away, but if you’re like most IT and security professionals you have your hands full. This year we’re sharing some tips for AWS re:Invent that will help you take advantage of great online…

Read More