Secure Your Azure Deployments With Cloud Secure

Consumption of public cloud infrastructure services continues to increase, requiring security teams to maintain a comprehensive and up-to-date inventory of cloud assets in-use across multiple environments, such as Azure and AWS, throughout their enterprise. According to 451 Group, 69 percent…

Read More

Top 5 Benefits of Public Cloud Computing Versus Traditional IT

This is part 2 of our two-part series on the benefits of public cloud computing, or Infrastructure as a Service (IaaS), versus traditional IT. Long before cloud computing, traditional IT infrastructure was great for enterprises that needed to run many…

Read More

Harness the Power of IaaS Without Compromising Security

This is the first of a two part series on the benefits of infrastructure-as-a-service (IaaS). Enterprises struggle to control costs and stay competitive – they face increasing demands to keep pace with requirements for data storage and protection, ever-changing regulations,…

Read More

Network-Bound Disk Encryption in Red Hat Linux 7

As you likely know, using cloud services means that you’re storing data on servers you don’t own. Mistakes made in the cloud are therefore more likely to become public and the impact can range from embarrassment, to losing all of…

Read More

Webinar: Automated infrastructure security with a practical example

Last week we collaborated with DevOps.com to produce our latest webinar: Automated infrastructure security with a practical example. CloudPassage solutions engineer Jenks Gibbons led the discussion by addressing why many security practitioners and engineers believe security is still roadblock within…

Read More

Why You Need a Loopback Firewall Rule

I see this problem a lot. You install a firewall policy on one of your Linux servers, and then all of a sudden you cannot update software components or generate email alerts. The rules look OK; in fact most communication…

Read More