Defining “next-level” container security

The rise of containers (especially Docker) has been meteoric. Just a few years ago organizations were only beginning to dip their toes into containerization practices, and now containers are being rapidly adopted and deployed, with some organizations exclusively using containers…

Read More

Learn all about automated compliance in our latest webinar

At this point, nearly every organization is held to some sort of compliance standard. Where there are customers, there are security specialists working on protecting their data in order to stay within compliance. And while most organizations agree that it’s…

Read More

Configuration security monitoring with Halo

After taking a brief hiatus, it’s time to return to another segment of Halo explainer videos! This week we’re diving into CSM, or the configuration security monitoring module in Halo. This module is integral to many of our security processes,…

Read More

Webinar: Real DevSecOps for the security practitioner

While many companies have begun implementing DevOps into at least one, if not several departments, different approaches to DevOps have complicated the industry and have made many practitioners wonder if security will ever be able to keep up. In his…

Read More

AWS re:Invent 2016 recap

Last week, we attended AWS re:Invent in Las Vegas along with 32,000 attendees. There, we were able to demonstrate the unique abilities of CloudPassage Halo, in particular delivering workload security at DevOps speed for Amazon Web Services users. In our…

Read More

Video: Cloud security: don’t harden infrastructure, follow data

Guest blog by David Spark, Spark Media Solutions “Hardening the cloud is a really difficult conversation for someone to have that doesn’t own the infrastructure,” said John Pironti (@jpironti), president, IP Architects, in our conversation at the Black Hat USA…

Read More