Why it’s important to comply with PCI

PCI Compliance is not just a fantastic way for your Director of Operations to sound important in meetings. It’s also key to ensuring all of your customer payment data is secured from attack. Beyond the fact that inadvertently exposing customer…

Read More

RSA award roundup

It’s been a banner week for us here at CloudPassage! In this season of Grammys, Globes, Oscars, Spammies, and so many more, we’ve garnered four technical excellence awards for Halo. While this may not impress Patriots fans, we’re extremely gratified…

Read More

How microsegmentation helps with compliance

Guest post by Matthew Pascucci, Frontline Sentinel In our last article on microsegmentation, we spoke about the security use-case. The security use-case is the linchpin to all other use cases for microsegmentation. It is the founding case that will spawn…

Read More

Survey results: 2016 Cloud Security Spotlight report

On Tuesday we announced results of the 2016 Cloud Security Spotlight report, which gathered intel from more than 300,000 members of the Information Security Community on LinkedIn. Participants in the survey were professionals from a broad range of organizations and questions…

Read More

Why Old FIM Tools Fail In Agile IT Models

File integrity monitoring (or FIM) tools can be an important part of intrusion detection and configuration security. When combined with other tools, FIM gives you vital information about your servers for compliance and security. But too often these tools fall…

Read More

U.S. Universities Get “F” For Cybersecurity Education

In recent remarks by Commerce Secretary Penny Pritzker at Montgomery College, she noted that there are an “estimated 210,000 open and unfilled cybersecurity jobs in the United States today.” This is a remarkable statistic, but not all that surprising since most…

Read More

Why a Network Appliance-Only Defense is a Costly Failure (RSA 2016)

Guest blog by David Spark, Spark Media Solutions “The less segmentation you have the easier you’re giving the path of least resistance to the malicious hacker,” said Bill Brenner(@billbrenner70), Senior Tech Writer, Akamai Technologies, in our conversation at the 2016…

Read More