CloudPassage

Webinar: Verify, don’t trust: What you need to know about popular Docker Hub images

This post was originally published here by casey pechan. Last week we presented part one of our webinar series – Verify, don’t trust: what you need to know about popular Docker Hub images. This 30-minute mini-series was presented by CloudPassage solutions engineer Jenks Gibbons, who dove into some exciting original research conducted by an independent team […]

Decentralize and provision security on-demand rather than on-command

This post was originally published here by  casey pechan. In Eastern Europe and the countries that used to belong to the Soviet Union, even after the collapse of their planning systems there has been persistent and widespread puzzlement that any society could aspire to prosperity without an overall plan. About two years after the breakup […]

Catch us at the IANS Atlanta Information Security Forum!

This post was originally published here by casey pechan. We look forward to IANS Information Security Forum events, and never miss an opportunity to present, attend, and mingle with great minds in the security space. We’re especially excited for next month’s IANS Atlanta event, where we will have four presentations! See below for additional details. We hope to […]

CloudPassage Halo: The security automation platform (2-minute video)

This post was originally published here by casey pechan. Our latest CloudPassage explainer video begins by demonstrating exactly why data centers were far easier to secure compared to today’s modern day environments and infrastructures, from private or public clouds to containers. So how do you guarantee that your servers and cloud workloads are protected throughout […]

5 tips to secure Docker containers for early adopters

This post was originally published here by alok ojha. Linux Containers, such as LXC & Solaris zones, have existed since the mid 2000s. However, containers weren’t widely used outside of large tech companies such as Google until Docker was first released at PyCon in March 2013 followed by the replacement of LXC with libcontainer as the default […]

Discovering Docker CVE-2017-14992 – Dynamite fishing for Moby

This post was originally published here by ash wilson. As you may have read in our Intel Octane SSD storage blog post, we’ve been deep into some exciting independent research here at CloudPassage. Our research has inspired us to explore and ask the question: What is the real danger of not following best practices when protecting […]

Forrester report: Vendor landscape: cloud workload security solutions, Q3 2017

This post was originally published here by casey pechan. Last month Forrester released their latest cloud security report, Vendor Landscape: Cloud Workload Security Solutions, Q3 2017. We were honored to be featured in the report, especially because it delves into critical issues shaping today’s security industry. Issues that we believe will soon become industry requirements as […]

Security pain points assuaged – automatically

This post was originally published here by casey pechan. Cybersecurity for the enterprise isn’t an easy process. It’s fluid. Breaches and malware rear their heads with a different look, feel, and style every day. Properly protecting your environments depends on a multitude of factors, but two take the cake as most important: your infrastructure environments […]

Infographic: Containers – tiny solutions for whale-sized challenges

This post was originally published here by casey pechan. We’ve been talking quite a bit about containers lately, and for good reason. CloudPassage recently announced Project Azul, our single-platform container security solution with automated compliance and security controls to monitor and secure containers, for example in Docker. And as you may know, container adoption is seeing some explosive […]

Cloud security landscape – what do organizations really need?

This post was originally published here by jeffb. You probably don’t associate the 2001 smash hit Shrek with cloud security, but consider the below quote: “Onions have layers. Ogres have layers. You get it? We both have layers.” – Shrek “Oh, you both have layers. Oh you know, not everybody likes onions. Cake! Everybody loves cake! Cakes […]

CloudPassage Halo is an on-demand, automated security platform that works in any infrastructure, at any scale. Halo is delivered as a service, so it deploys in minutes and scales dynamically — with no servers to provision and configure. With Halo, our customers deploy layered security at every workload – servers, virtual machines, cloud instances and containers.
Share this page