Back to basics: Secure SSH configuration

Along with the unveiling of Container Secure, this week CloudPassage  announced the availability of CSM policies for CentOS 7 and 6. These policies are inline with the CIS CentOS Linux 7 Benchmark v2.1.1 and CIS CentOS Linux 6 Benchmark v2.0.2….

Read More

Configuration security monitoring with Halo

After taking a brief hiatus, it’s time to return to another segment of Halo explainer videos! This week we’re diving into CSM, or the configuration security monitoring module in Halo. This module is integral to many of our security processes,…

Read More

Managing issues and policies within the new Halo interface

It’s time for the third and final installment of our series: explainer videos for the new Halo interface. This week we’re breaking down how to manage issues and policies within the new Halo interface. We’ve made some exciting changes so…

Read More

Webinar: Real DevSecOps for the security practitioner

While many companies have begun implementing DevOps into at least one, if not several departments, different approaches to DevOps have complicated the industry and have made many practitioners wonder if security will ever be able to keep up. In his…

Read More

Will It Scale? The Security Edition

Guest blog by Johna Johnson, CEO and founder, Nemertes Research Sometimes when you push a security solution too far outside its comfort zone, performance plummets. Or, worse: the system can end up crashing. Worst of all, it can misbehave while…

Read More