CloudPassage is a winner of the 2017 Stratus Award!

The Business Intelligence Group recently announced that CloudPassage has won a 2017 Stratus Award in their annual contest. Each year the organization seeks out the companies that offer superior performance and unique solutions within cloud technologies. “The entire CloudPassage team…

Read More

The social side of hacking

Perhaps one of the most devious forms of phishing is social engineering, or the gleaning of critical information about individuals or organizations through social media, email, or other social interactions. In fact, the most recent global cyber infections – WannaCry…

Read More

Containers 101 – What do you need to know?

Thanks to Docker, containers are now the future of web development. According to DataDog, 15% of hosts run Docker, which is significantly up both from the 6% of hosts running it at this point in 2015 and the 0% of…

Read More

The best tracks from Black Hat 2017

Over the course of the last few years, Black Hat – the desert meetup for security geeks – has evolved impressively. So many events happen simultaneously, and in the midst of the parties and socialization I attended as many security…

Read More

White paper: A new approach for securing DevOps in the cloud

It’s no secret we love the team over at Puppet. We’ve got our approved CloudPassage module on PuppetForge, and we’ve already shown you different ways you can tackle securing DevOps using Puppet and CloudPassage Halo in tandem. Now we’ve put…

Read More

When it comes to cyber attacks, NATO means business

Here’s something a little scary to think about: NATO’s Secretary General, Jens Stoltenberg, said last month that a massive cyber attack could trigger Article 5 of the organization’s treaty. For those of you blissfully unaware of the ins and outs…

Read More

Why it’s important to comply with PCI

PCI Compliance is not just a fantastic way for your Director of Operations to sound important in meetings. It’s also key to ensuring all of your customer payment data is secured from attack. Beyond the fact that inadvertently exposing customer…

Read More