5 tips to secure Docker containers for early adopters

Linux Containers, such as LXC & Solaris zones, have existed since the mid 2000s. However, containers weren’t widely used outside of large tech companies such as Google until Docker was first released at PyCon in March 2013 followed by the…

Read More

Webinar: Meeting compliance regulations in cloud environments

Last week we teamed up with 451 Research to deliver our latest webinar: meeting compliance regulations in cloud environments. In this webinar CloudPassage director of product marketing Jack Marsal dove into the various friction points caused by old compliance and…

Read More

What the Apache Struts vulnerability means for you

Unless you’ve been avoiding the news lately, you’ve likely heard about a few major breaches and the Apache Struts vulnerabilities associated with them. Apache Struts 2 is an elegant, extensible framework for building enterprise-ready Java web applications. But unfortunately this…

Read More

Security pain points assuaged – automatically

Cybersecurity for the enterprise isn’t an easy process. It’s fluid. Breaches and malware rear their heads with a different look, feel, and style every day. Properly protecting your environments depends on a multitude of factors, but two take the cake…

Read More

Learn all about automated compliance in our latest webinar

At this point, nearly every organization is held to some sort of compliance standard. Where there are customers, there are security specialists working on protecting their data in order to stay within compliance. And while most organizations agree that it’s…

Read More

How Halo can help detect cloud breaches

What happens to companies when they are using a public cloud infrastructure like AWS or Azure and hackers obtain login credentials to manage the cloud account? Three years ago, this happened to a company called Code Spaces. They went out…

Read More

How microsegmentation helps with applications

Guest post by Matthew Pascucci, Frontline Sentinel One use case for microsegmentation that we haven’t completely touched on in previous posts is the protection of applications within your network. We’ve discussed the use of security as a whole and why…

Read More

How microsegmentation helps with compliance

Guest post by Matthew Pascucci, Frontline Sentinel In our last article on microsegmentation, we spoke about the security use-case. The security use-case is the linchpin to all other use cases for microsegmentation. It is the founding case that will spawn…

Read More