San Francisco, CA, USA
Mar 4, 2020   |  By Cloudpassage
The “Forrester Wave™: Cloud Workload Security, Q4 2019” report published by leading global research and advisory firm Forrester, Inc. provides an excellent overview of the security challenges posed by the transition to cloud-based environments and discusses the cloud workload security solutions best poised to address them. One important criterion is API-level Connectivity and Control for IaaS and PaaS.
Jan 30, 2020   |  By Cloudpassage
An independent evaluation published by leading global research and advisory firm Forrester provides an excellent overview of the security challenges posed by the transition to cloud-based environments—and discusses the cloud workload security solutions best poised to address them. As the shift to cloud-based technology progresses, a growing number of organizations are exposed to the widening gap between traditional security coverage, and the unique needs of the cloud environment.
Jan 10, 2020   |  By Mykhailosindieev
Monolithic applications are outdated. We are now solidly in a development revolution as rapid software development and deployment have become standard. Microservices and containers are key to enabling this new way of working driven by DevOps practices such as Continuous Integration and Continuous Delivery. As a result, securing Kubernetes master and worker nodes has become critical.
Dec 20, 2019   |  By Cloudpassage
As enterprise workloads move to the cloud, more cybersecurity professionals are experiencing the complications of protecting their workloads in these faster and more dynamic environments. These are typical public cloud security challenges. Part of the reason is because cloud infrastructure is very easy to set up, so more and more people are now able to do it, even without the help of IT.
Nov 14, 2019   |  By Siri Oaklander
Shipping services firm Pitney Bowes has recently joined the growing ranks of businesses targeted by high-impact ransomware attacks—in their case, the Ryuk virus. The Ryuk virus has also been named as the culprit in recent data breaches spanning both global and domestic industries, targeting several cities in Florida and Massachusetts, as well as media companies such as Tribune Publishing, and France’s M6 Group.
Feb 25, 2019   |  By CloudPassage
Back when IT infrastructures took months to develop and deploy, security and compliance teams had time to configure and release security controls in parallel. But today, high-performing teams deploy on demand or multiple times per day, and they can deploy changes to production in less than an hour. Servers themselves may exist for less than an hour. This rapid pace is leaving security teams behind. And the massive gap between code being deployed within hours and security projects taking weeks puts companies at risk.
Feb 1, 2019   |  By CloudPassage
Public cloud use is increasing as organizations leverage IaaS environments to improve operational agility and increase efficiency. However, security teams struggle to maintain security visibility of these dynamic computing environments due to decentralization of IT, the expanding cloud attack surface, and cloud service misconfigurations that create risk.
Jan 1, 2019   |  By CloudPassage
CloudPassage® Halo® provides a broad range of security controls that work in any environment. This document will focus on the ease of use and benefits of using Halo in Amazon Elastic Compute Cloud (Amazon EC2) as well as Amazon Elastic Container Service.
Dec 1, 2018   |  By CloudPassage
Containers exist as part of a continuum from centralized mainframes to clustered servers, virtual machines, and ultimately containers. Containers, like all technology, must be used strategically. As one of many possible architectures for deploying services and applications, how one chooses may determine success or failure.
Nov 1, 2018   |  By CloudPassage
This paper provides guidelines and recommendations for selecting and planning the implementation of Kubernetes-managed overlay networks. This paper examines the implementation of the Flannel, a popular overlay network, within the context of the design considerations set forth in this document.
Aug 3, 2018   |  By CloudPassage
In this webinar to learn how to regain security visibility across all of your AWS accounts.
Jul 5, 2018   |  By CloudPassage