What is automated compliance?

Working in cyber security we’re all familiar with the need for IT compliance and know that organizations processing sensitive information (e.g. hospitals, banks) must adhere to a set of rules, standards, and processes protecting customer and user information. However as…

Read More

Healthcare servers at risk for attack: CloudPassage CTO weighs in

Last week the FBI issued a warning regarding cybercriminals specifically targeting FTP servers operating in anonymous mode. The warning applied to FTP servers associated with medical and dental facilities that hold access to protected health information and personally identifiable information….

Read More

RSA award roundup

It’s been a banner week for us here at CloudPassage! In this season of Grammys, Globes, Oscars, Spammies, and so many more, we’ve garnered four technical excellence awards for Halo. While this may not impress Patriots fans, we’re extremely gratified…

Read More

CloudPassage Halo: What’s new in the latest update?

A few weeks ago, we released the latest update to our award-winning Halo platform. The update includes several enhancements including a new filtering feature in the portal user interface, visual and functional improvements to the Traffic Discovery feature, improved server…

Read More

CloudPassage Halo now offered in solution-specific packages

Yesterday we announced new packaged offerings of CloudPassage Halo that more cost-effectively represent how enterprises use Halo for their server and cloud workload security. These packages can be purchased separately or in any combination in order to provide your organization…

Read More

How microsegmentation helps with compliance

Guest post by Matthew Pascucci, Frontline Sentinel In our last article on microsegmentation, we spoke about the security use-case. The security use-case is the linchpin to all other use cases for microsegmentation. It is the founding case that will spawn…

Read More

Drivers for organizations to adopt and embrace agile security

Cyber threats against enterprises continue to rise, as more people are connected to the Internet, the criminal underworld continues to grow and mature, and state-sponsored attacks are on the rise. Regulations of cyber security continue to grow. And IT organizations…

Read More

Survey results: 2016 Cloud Security Spotlight report

On Tuesday we announced results of the 2016 Cloud Security Spotlight report, which gathered intel from more than 300,000 members of the Information Security Community on LinkedIn. Participants in the survey were professionals from a broad range of organizations and questions…

Read More