CloudPassage
Webinar: Verify, don’t trust: What you need to know about popular Docker Hub images
This post was originally published here by casey pechan. Last week we presented part one of our webinar series – Verify, don’t trust: what you need to know about popular Docker Hub images. This 30-minute mini-series was presented by CloudPassage solutions engineer Jenks Gibbons, who dove into some exciting original research conducted by an independent team […]
Decentralize and provision security on-demand rather than on-command
This post was originally published here by casey pechan. In Eastern Europe and the countries that used to belong to the Soviet Union, even after the collapse of their planning systems there has been persistent and widespread puzzlement that any society could aspire to prosperity without an overall plan. About two years after the breakup […]
Insurance and cybersecurity, the parallels are clear
This post was originally published here by shaane syed. It’d be awfully nice not to need car insurance. Or homeowners insurance. Or fire insurance. These added expenses don’t increase the value of your car or home, and there’s a good chance you’ll never use them. The money you pour into insurance is arguably even being […]
Catch us at the IANS Atlanta Information Security Forum!
This post was originally published here by casey pechan. We look forward to IANS Information Security Forum events, and never miss an opportunity to present, attend, and mingle with great minds in the security space. We’re especially excited for next month’s IANS Atlanta event, where we will have four presentations! See below for additional details. We hope to […]
CloudPassage Halo: The security automation platform (2-minute video)
This post was originally published here by casey pechan. Our latest CloudPassage explainer video begins by demonstrating exactly why data centers were far easier to secure compared to today’s modern day environments and infrastructures, from private or public clouds to containers. So how do you guarantee that your servers and cloud workloads are protected throughout […]
5 tips to secure Docker containers for early adopters
This post was originally published here by alok ojha. Linux Containers, such as LXC & Solaris zones, have existed since the mid 2000s. However, containers weren’t widely used outside of large tech companies such as Google until Docker was first released at PyCon in March 2013 followed by the replacement of LXC with libcontainer as the default […]
Discovering Docker CVE-2017-14992 – Dynamite fishing for Moby
This post was originally published here by ash wilson. As you may have read in our Intel Octane SSD storage blog post, we’ve been deep into some exciting independent research here at CloudPassage. Our research has inspired us to explore and ask the question: What is the real danger of not following best practices when protecting […]
Forrester report: Vendor landscape: cloud workload security solutions, Q3 2017
This post was originally published here by casey pechan. Last month Forrester released their latest cloud security report, Vendor Landscape: Cloud Workload Security Solutions, Q3 2017. We were honored to be featured in the report, especially because it delves into critical issues shaping today’s security industry. Issues that we believe will soon become industry requirements as […]
Security pain points assuaged – automatically
This post was originally published here by casey pechan. Cybersecurity for the enterprise isn’t an easy process. It’s fluid. Breaches and malware rear their heads with a different look, feel, and style every day. Properly protecting your environments depends on a multitude of factors, but two take the cake as most important: your infrastructure environments […]
What the Apache Struts vulnerability means for you
This post was originally published here by cliff turner. Unless you’ve been avoiding the news lately, you’ve likely heard about a few major breaches and the Apache Struts vulnerabilities associated with them. Apache Struts 2 is an elegant, extensible framework for building enterprise-ready Java web applications. But unfortunately this year there have been multiple security […]