Best practices for securing your Azure SQL

Azure SQL enables you to maintain the security, integrity and consistency of your data, which is critical when customer information is at stake, but it requires using a new approach to security. In Azure, you can have your SQL Server…

Read More

Securing your Azure Storage accounts

Enterprise data is growing exponentially and becoming more complex, making it harder to manage, and an even bigger challenge to store. That’s why more organizations are looking to public cloud storage options, such as Azure Storage, as a way to…

Read More

Do you have leaky S3 buckets?

Last year was the year of “leaky buckets,” as in S3 buckets, making some of our worst cloud security fears a reality.  S3, or Simple Storage Service, is a public cloud storage service within Amazon Web Services (AWS). Just a…

Read More

Securing Azure Application Gateway

Web applications are becoming frequent targets of malicious attacks that exploit common vulnerabilities, such as SQL injection attacks or cross site scripting attacks, which makes securing your Azure Application Gateway more critical than ever. Preventing such attacks in application code…

Read More

8 ways to achieve agile security

Between 2017 and 2021, worldwide spending on cybersecurity will top $1 trillion, according to predictions from Cybersecurity Ventures. The barrage of cyberattacks on enterprises and new threat vectors within networks due to the move to Infrastructure as a Service (IaaS),…

Read More

Halo Wins 5-Star Rating from SC Magazine

CloudPassage is proud to announce that its Halo security platform was honored by SC Magazine with a 5-Star Rating (out of five stars) in its latest SC Labs product review. CloudPassage Halo won perfect 5-Star Ratings in all categories: Features,…

Read More

New: Weekly Halo Cloud Secure Demos

The New Year is a time to celebrate new beginnings. Starting over with a clean slate of resolutions, goals, launches, etc. That’s the good news. Now here’s the bad: If you thought 2018 was a tough year for data breaches,…

Read More

Best Practices for Securing AWS Lambda

We’re hearing more and more about services that are not based on traditional server models, such as Amazon S3 buckets—basically big buckets of storage in the cloud, and the concept of serverless computing. The good thing about what are now…

Read More

5 Common DNS Attacks

The Domain Name System (DNS) security directly impacts both end users and service providers, as the system’s critical nature makes it a sought-after target for those attempting to compromise or disrupt Internet services via DNS attacks.   DNS is the…

Read More