CloudPassage

2010
San Francisco, CA, USA
Nov 14, 2019   |  By Siri Oaklander
Shipping services firm Pitney Bowes has recently joined the growing ranks of businesses targeted by high-impact ransomware attacks—in their case, the Ryuk virus. The Ryuk virus has also been named as the culprit in recent data breaches spanning both global and domestic industries, targeting several cities in Florida and Massachusetts, as well as media companies such as Tribune Publishing, and France’s M6 Group.
Nov 5, 2019   |  By Daniel Wolczenkow
CloudPassage recently released new templates for Windows 2019 Log-based Intrusion Detection System (LIDS) and File Integrity Monitoring (FIM). In this article, I will go over some use cases and how organizations can use the templates to protect and secure their infrastructure.
Oct 30, 2019   |  By Siri Oaklander
IaaS has continued to evolve and make it easier for companies to set up public cloud infrastructure faster than ever. Many are doing just that and moving more and more workloads to cloud environments. Although in these new, dynamic environments where changes happen often, and fast, security is mission-critical, but achieving security visibility is still a challenge for security teams.
Sep 18, 2019   |  By Cloudpassage
We live in a culture of rapid innovation, but that innovation can result in a variety of security mistakes. Businesses must innovate quickly to compete in today’s markets, and software and public cloud infrastructure, or IaaS, are significant enablers of that innovation. Software is a fast mechanism to deliver innovation, and public cloud infrastructure is an agile way to support rapid software development and delivery. Both of which can lead to significant security mistakes.
Aug 27, 2019   |  By Amol Sarwate
Here at CloudPassage, we’ve been researching how public data can be used for real-time vulnerability alerting using principles from the United States Tsunami Warning Center. I am excited to announce that we will be presenting and demonstrating initial results from this research at the OWASP Global AppSec 2019 conference in Washington DC. Please join our session on vulnerability alerting and threat intelligence on September 13 at 4:30 pm.
Feb 25, 2019   |  By CloudPassage
Back when IT infrastructures took months to develop and deploy, security and compliance teams had time to configure and release security controls in parallel. But today, high-performing teams deploy on demand or multiple times per day, and they can deploy changes to production in less than an hour. Servers themselves may exist for less than an hour. This rapid pace is leaving security teams behind. And the massive gap between code being deployed within hours and security projects taking weeks puts companies at risk.
Feb 1, 2019   |  By CloudPassage
Public cloud use is increasing as organizations leverage IaaS environments to improve operational agility and increase efficiency. However, security teams struggle to maintain security visibility of these dynamic computing environments due to decentralization of IT, the expanding cloud attack surface, and cloud service misconfigurations that create risk.
Jan 1, 2019   |  By CloudPassage
CloudPassage® Halo® provides a broad range of security controls that work in any environment. This document will focus on the ease of use and benefits of using Halo in Amazon Elastic Compute Cloud (Amazon EC2) as well as Amazon Elastic Container Service.
Dec 1, 2018   |  By CloudPassage
Containers exist as part of a continuum from centralized mainframes to clustered servers, virtual machines, and ultimately containers. Containers, like all technology, must be used strategically. As one of many possible architectures for deploying services and applications, how one chooses may determine success or failure.
Nov 1, 2018   |  By CloudPassage
This paper provides guidelines and recommendations for selecting and planning the implementation of Kubernetes-managed overlay networks. This paper examines the implementation of the Flannel, a popular overlay network, within the context of the design considerations set forth in this document.
Aug 3, 2018   |  By CloudPassage
In this webinar to learn how to regain security visibility across all of your AWS accounts.
Jul 5, 2018   |  By CloudPassage