Working in cyber security we’re all familiar with the need for IT compliance and know that organizations processing sensitive information (e.g. hospitals, banks) must adhere to a set of rules, standards, and processes protecting customer and user information. However as…
Tag: File Integrity Monitoring
Healthcare servers at risk for attack: CloudPassage CTO weighs in
Last week the FBI issued a warning regarding cybercriminals specifically targeting FTP servers operating in anonymous mode. The warning applied to FTP servers associated with medical and dental facilities that hold access to protected health information and personally identifiable information….
Case study: Xero chooses Halo for workload security at DevOps speed
Xero is easy-to-use online accounting software for small businesses and their advisors. With over 850,000 subscribers in 180 countries (and growing), it was time to select a security solution for their expanding organization. Xero chose Halo to protect their workloads…
RSA award roundup
It’s been a banner week for us here at CloudPassage! In this season of Grammys, Globes, Oscars, Spammies, and so many more, we’ve garnered four technical excellence awards for Halo. While this may not impress Patriots fans, we’re extremely gratified…
WordPress vulnerability – Privilege Escalation and Content Injection
On Thursday January 26th, 2017 the WordPress support team released WordPress 4.7.2. On Wednesday February 1st, 2017 they disclosed an additional vulnerability within the REST API of WordPress that had been fixed with the 4.7.2 release. The vulnerability we are…
CloudPassage Halo: What’s new in the latest update?
A few weeks ago, we released the latest update to our award-winning Halo platform. The update includes several enhancements including a new filtering feature in the portal user interface, visual and functional improvements to the Traffic Discovery feature, improved server…
CloudPassage Halo now offered in solution-specific packages
Yesterday we announced new packaged offerings of CloudPassage Halo that more cost-effectively represent how enterprises use Halo for their server and cloud workload security. These packages can be purchased separately or in any combination in order to provide your organization…
How microsegmentation helps with compliance
Guest post by Matthew Pascucci, Frontline Sentinel In our last article on microsegmentation, we spoke about the security use-case. The security use-case is the linchpin to all other use cases for microsegmentation. It is the founding case that will spawn…
Drivers for organizations to adopt and embrace agile security
Cyber threats against enterprises continue to rise, as more people are connected to the Internet, the criminal underworld continues to grow and mature, and state-sponsored attacks are on the rise. Regulations of cyber security continue to grow. And IT organizations…
Survey results: 2016 Cloud Security Spotlight report
On Tuesday we announced results of the 2016 Cloud Security Spotlight report, which gathered intel from more than 300,000 members of the Information Security Community on LinkedIn. Participants in the survey were professionals from a broad range of organizations and questions…