Auditing Linux environments using LIDS and ‘auditd’

If you use LIDS at all, your life is about to get easier: Recently we released nine new templates for the CloudPassage Halo log-based intrusion detection system, (LIDS) which consists of different rules/policies for ‘auditd’. The CloudPassage Halo log-based intrusion…

Read More

Changes in the CIS controls and why you need to know

Have you heard of the top 20 Controls from the Center for Internet Security (CIS)? These are also known as the CIS common controls and they’re my favorite list of controls. Sure, PCI, NIST, CSA, SOX, FERPA, NERC, and HIPAA…

Read More

Announcing…Halo Cortex!

We have an amazing launch that we’re thrilled to share with you today! Halo Cortex is officially live (check out our press release) and it’s about to drastically improve your communication and DevOps processes with CloudPassage Halo. Halo Cortex is…

Read More

5 tips to secure Docker containers for early adopters

Linux Containers, such as LXC & Solaris zones, have existed since the mid 2000s. However, containers weren’t widely used outside of large tech companies such as Google until Docker was first released at PyCon in March 2013 followed by the…

Read More

Webinar: Meeting compliance regulations in cloud environments

Last week we teamed up with 451 Research to deliver our latest webinar: meeting compliance regulations in cloud environments. In this webinar CloudPassage director of product marketing Jack Marsal dove into the various friction points caused by old compliance and…

Read More

What the Apache Struts vulnerability means for you

Unless you’ve been avoiding the news lately, you’ve likely heard about a few major breaches and the Apache Struts vulnerabilities associated with them. Apache Struts 2 is an elegant, extensible framework for building enterprise-ready Java web applications. But unfortunately this…

Read More

Security pain points assuaged – automatically

Cybersecurity for the enterprise isn’t an easy process. It’s fluid. Breaches and malware rear their heads with a different look, feel, and style every day. Properly protecting your environments depends on a multitude of factors, but two take the cake…

Read More

Learn all about automated compliance in our latest webinar

At this point, nearly every organization is held to some sort of compliance standard. Where there are customers, there are security specialists working on protecting their data in order to stay within compliance. And while most organizations agree that it’s…

Read More