Halo Wins 5-Star Rating from SC Magazine

CloudPassage is proud to announce that its Halo security platform was honored by SC Magazine with a 5-Star Rating (out of five stars) in its latest SC Labs product review. CloudPassage Halo won perfect 5-Star Ratings in all categories: Features,…

Read More

New: Weekly Halo Cloud Secure Demos

The New Year is a time to celebrate new beginnings. Starting over with a clean slate of resolutions, goals, launches, etc. That’s the good news. Now here’s the bad: If you thought 2018 was a tough year for data breaches,…

Read More

Best Practices for Securing AWS Lambda

We’re hearing more and more about services that are not based on traditional server models, such as Amazon S3 buckets—basically big buckets of storage in the cloud, and the concept of serverless computing. The good thing about what are now…

Read More

5 Common DNS Attacks

The Domain Name System (DNS) security directly impacts both end users and service providers, as the system’s critical nature makes it a sought-after target for those attempting to compromise or disrupt Internet services via DNS attacks.   DNS is the…

Read More

Mitigating the First Major Kubernetes Vulnerability

Recent news on the discovery of the first Kubernetes vulnerability, the popular cloud container orchestrations system, highlights two things critical to security, the need to: Audit and harden systems on the periphery and inside an infrastructure, and    Continually review these…

Read More

Best Practices for Securing Amazon EC2

As enterprises move applications from traditional data centers to a public or hybrid cloud , their legacy security model also needs to change to support the new environment. For example, in the Amazon Web Services (AWS) environment, AWS is responsible…

Read More

Protecting Your Cloud-Based Relational Databases

As more enterprises move more sensitive data to the cloud, how you secure  and protect your public cloud services and resources is critical. While Amazon does a stellar job of securing the underlying server hardware and software as their part…

Read More

Creating a Culture of Cybersecurity

Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you…

Read More

Securing Your AWS Virtual Private Cloud

Amazon Web Services provides highly secure on-demand cloud computing services that serve as the building blocks you need to quickly start developing applications and deploy them to the cloud. AWS Virtual Public Cloud (VPC) makes it easier for you to…

Read More