CloudPassage
Petya / GoldenEye is spreading. Here’s how Halo can help.
This post was originally published here by leslie devlin. The latest wave of ransomware, Petya/GoldenEye, started hitting Ukraine, Russia and western Europe earlier today and has already brought down critical infrastructure. Among those confirmed as impacted are Kiev’s main airport and metro system, Ukraine’s state power company, and several large banks, healthcare companies and manufacturing […]
What is up with HIPAA?
This post was originally published here by mark aklian. After almost 20 years in IT, people still tell me I’m crazy when I say that I sincerely enjoy compliance. I enjoy dealing with lawyers, love audit and compliance teams, and writing service provider security requirements documents. Having been on the enterprise financial side of tech […]
Do more CISOs mean a greater focus on security concerns?
This post was originally published here by shaane syed. In early 2016 the percentage of enterprise organizations with Chief Information Security Officers (CISOs) in their C-Suites stood at 50%. In early 2017 that number has already leapt to 65%, representing a 30% increase in just a single year. This seems to indicate organizations are truly […]
What is automated compliance?
This post was originally published here by cliff turner. Working in cyber security we’re all familiar with the need for IT compliance and know that organizations processing sensitive information (e.g. hospitals, banks) must adhere to a set of rules, standards, and processes protecting customer and user information. However as IT application development and deployment environments […]
Managing servers and installing agents on the new Halo interface
This post was originally published here by leslie devlin. In the second series of our explainer video blog posts, we’re breaking down how to install agents and manage servers on the new Halo interface. We have a feeling you’re going to like the changes, and the ease of use that comes along with them. Installing agents […]
Webinar: Real DevSecOps for the security practitioner
This post was originally published here by casey pechan. While many companies have begun implementing DevOps into at least one, if not several departments, different approaches to DevOps have complicated the industry and have made many practitioners wonder if security will ever be able to keep up. In his webinar hosted by the SANS Institute, CloudPassage […]
Rapid transformation in computing – IaaS market trends
This post was originally published here by jack marsal. We are currently witnessing a huge transformation in how computing is done, with on-premises infrastructure being steadily and rapidly replaced by cloud infrastructure. If smartphones were the technology story of the last decade, then Infrastructure-as-a-Service (IaaS) may very well be the story of this one. This […]
Bringing security into the CICD pipeline with Halo
This post was originally published here by casey pechan. There’s a transformation happening in how IT is delivered in enterprises everywhere – what was once a predictable and stable IT environment has now become more fluid and is in a constant state of change. The average lifetime of a server, for example, has gone from […]
Security considerations in a DevOps pipeline
This post was originally published here by amit gupta. Using DevOps methodologies the goal is to speed up deployment using automation while increasing the predictability and manageability of the development cycle. Too often though – and this may be true more often than not – security is left for last, ultimately slowing down deployment, backing […]
Is your security vendor ready for the cloud? 10 questions to ask
This post was originally published here by cliff turner. Cloud security vendors occupy a major role in organizations as both trusted advisor and protector. Because this role has the potential to affect every aspect of your organization, it’s critical to carefully vet your vendor and their platform. To guide your research, use these 10 questions […]