Real-time Vulnerability Alerting

Here at CloudPassage, we’ve been researching how public data can be used for real-time vulnerability alerting using principles from the United States Tsunami Warning Center. I am excited to announce that we will be presenting and demonstrating initial results from…

Read More

Top 5 breakouts to attend at AWS re:Inforce 2019

AWS re:Inforce 2019, the biggest cloud security event of the year, promises to deliver as a hands-on conference offering a deep dive into the latest approaches to security, best practices and risk management using AWS services, features, and tools, as…

Read More

Tips for a Successful AWS re:Inforce 2019

AWS re:Inforce 2019 may still be a month away, but if you’re like most IT and security professionals you may have your hands full, leaving you with little time to prepare. If so, and you’re planning on attending, don’t worry–we…

Read More

Best practices for securing your Azure SQL

Azure SQL enables you to maintain the security, integrity and consistency of your data, which is critical when customer information is at stake, but it requires using a new approach to security. In Azure, you can have your SQL Server…

Read More

Securing your Azure Storage accounts

Enterprise data is growing exponentially and becoming more complex, making it harder to manage, and an even bigger challenge to store. That’s why more organizations are looking to public cloud storage options, such as Azure Storage, as a way to…

Read More

Do you have leaky S3 buckets?

Last year was the year of “leaky buckets,” as in S3 buckets, making some of our worst cloud security fears a reality.  S3, or Simple Storage Service, is a public cloud storage service within Amazon Web Services (AWS). Just a…

Read More

Securing Azure Application Gateway

Web applications are becoming frequent targets of malicious attacks that exploit common vulnerabilities, such as SQL injection attacks or cross site scripting attacks, which makes securing your Azure Application Gateway more critical than ever. Preventing such attacks in application code…

Read More

8 ways to achieve agile security

Between 2017 and 2021, worldwide spending on cybersecurity will top $1 trillion, according to predictions from Cybersecurity Ventures. The barrage of cyberattacks on enterprises and new threat vectors within networks due to the move to Infrastructure as a Service (IaaS),…

Read More