Halo Cloud Secure: Now available to everyone

Today we announce the general availability of Halo Cloud Secure, which offers comprehensive and continuous visibility across your public cloud infrastructure environments. According to The 2018 Cloud Security Report, 43% of cloud security professionals cite a lack of visibility into…

Read More

Gaining security visibility of your public cloud assets

As the use of public cloud services increases, security teams struggle to maintain visibility of their cloud assets. In fact, in one recent survey, 43% of cloud security pros said that lack of visibility into infrastructure security is their biggest…

Read More

Halo Cloud Secure: A unified product

Vitaliy Geraymovych, Talli Somekh, and I founded CloudPassage in 2010. In those early days, cloud infrastructure was broadly dismissed as little more than a hosting environment for games, blogs, and experiments. The bulk of IaaS offers revolved around cloud servers…

Read More

Webinar: integrating security into your CI pipeline

Our latest webinar Integrating security into our CI pipeline, examines how containers and image vulnerability assessment can be integrated into your DevSecOps tools and processes. After all, one of the biggest challenges of adopting containerization is fast and effective vulnerability…

Read More

Changes in the CIS controls and why you need to know

Have you heard of the top 20 Controls from the Center for Internet Security (CIS)? These are also known as the CIS common controls and they’re my favorite list of controls. Sure, PCI, NIST, CSA, SOX, FERPA, NERC, and HIPAA…

Read More

Proactive versus reactive vulnerability management

A career in information security is a trial by fire, one I dove into headfirst when I began career 18 years ago. Challenging problems reared their ugly heads through attacks like NIMDA, CodeRed, SQLSlammer and others. These viruses took advantage…

Read More

Webinar: Five tips to secure Docker containers

We’ve got a new webinar coming out January 24th that you won’t want to miss; especially if your organization is implementing containers anytime soon. This five tips to secure Docker containers webinar builds off of a five container tips blog…

Read More

What the Apache Struts vulnerability means for you

Unless you’ve been avoiding the news lately, you’ve likely heard about a few major breaches and the Apache Struts vulnerabilities associated with them. Apache Struts 2 is an elegant, extensible framework for building enterprise-ready Java web applications. But unfortunately this…

Read More

Introduction to Software Vulnerability Assessment

CloudPassage Halo’s Software Vulnerability Assessment module (SVA), is one of the most critical components of the Halo platform. The SVA module regularly scans all of your protected servers to detect known vulnerable packages, providing universal visibility into your workloads. These…

Read More