cloudpassage.com
Resource & Knowledge Center | CloudPassage
https://www.cloudpassage.com/resources/white-papers
Skip to main content. This playbook summarizes how DevOps and information security can co-exist through the application of a new approach referred to as DevSecOps. Forrester Market Overview: Cloud Workload Security Management Solutions - Automate Or Die. How Enterprises Are Attacking the Cloud Security Challenge. No matter what their size or industry, most enterprises today are employing multiple cloud services and applications. Keeping Your Workloads Secure on AWS. Cloud Security Survey: 2016 Results.
blog.cloudpassage.com
Security Breaks DevOps – Here’s How to Fix It - The CloudPassage Blog
https://blog.cloudpassage.com/2015/07/14/security-breaks-devops-heres-how-to-fix-it
Skip to main content. Insights for an Unsecure World. Back to Blog Index. Security Breaks DevOps Here’s How to Fix It. Now security teams have an opportunity to learn from the DevOps experience. Manual policy provisioning and security operations in highly dynamic IaaS environments simply doesn’t work, for the same reason it doesn’t work for DevOps teams the pace of change is simply too to fast to handle manually. Instant Visibility and Continuous Enforcement at the Workload. A modern security platform sh...
blog.cloudpassage.com
cloudpassage halo Archives - The CloudPassage Blog
https://blog.cloudpassage.com/tag/cloudpassage-halo
Skip to main content. Insights for an Unsecure World. CloudPassage reaches FedRAMP Ready status. On Wednesday, we announced that we are the first Cloud Service Provider (CSP) to achieve FedRAMP Ready status through the new accelerated Federal Risk and Authorization Management Program (FedRAMP Accelerated), and CloudPassage Halo is now listed on the FedRAMP marketplace…. Video: Cloud security: don’t harden infrastructure, follow data. Video: The cloud amplifies old security problems (Black Hat 2016).
blog.cloudpassage.com
mitch bishop, Author at The CloudPassage Blog
https://blog.cloudpassage.com/author/mbishop
Skip to main content. Insights for an Unsecure World. Why Old FIM Tools Fail In Agile IT Models. File integrity monitoring (or FIM) tools can be an important part of intrusion detection and configuration security. When combined with other tools, FIM gives you vital information about your servers for compliance and security. But too often these tools fall…. US Universities Get F For Cybersecurity Education. Scaling Security With Managed Services from CSC: An Interview with Erik Winebrenner. Cybercrime cos...
blog.cloudpassage.com
CloudPassage Halo Scans Archives - The CloudPassage Blog
https://blog.cloudpassage.com/tag/cloudpassage-halo-scans
Skip to main content. Insights for an Unsecure World. Tag: CloudPassage Halo Scans. CloudPassage Halo Now Detects the VENOM Vulnerability. This week a vulnerability, dubbed VENOM (CVE-2015-3456), was discovered in the floppy disk driver code of the hardware emulator and virtualization software called QEMU (Quick Emulator). This might sound otherwise pretty esoteric, but it just so happens that the QEMU…. Stay Up to Date. Get the latest news and tips on protecting critical business assets.
blog.cloudpassage.com
perimeter security Archives - The CloudPassage Blog
https://blog.cloudpassage.com/tag/perimeter-security
Skip to main content. Insights for an Unsecure World. We’ve grown dependent on a perimeter. Vendors build tools that have no security at all without a robust perimeter. This term colors the way we as an industry think about security. The assumption of a perimeter makes decisions for us,…. Stay Up to Date. Get the latest news and tips on protecting critical business assets. Halo Tips and Tricks 135. 2016 CLOUDPASSAGE AND HALO.
cloudpassage.com
Resource & Knowledge Center | CloudPassage
https://www.cloudpassage.com/resources
Skip to main content. This playbook summarizes how DevOps and information security can co-exist through the application of a new approach referred to as DevSecOps. Forrester Market Overview: Cloud Workload Security Management Solutions - Automate Or Die. How Enterprises Are Attacking the Cloud Security Challenge. No matter what their size or industry, most enterprises today are employing multiple cloud services and applications. Keeping Your Workloads Secure on AWS. Cloud Security Survey: 2016 Results.
cloudpassage.com
Security Platform for any Infrastructure | CloudPassage
https://www.cloudpassage.com/platform
Skip to main content. Comprehensive security and compliance for any infrastructure, in an easy-to-use, scalable, on demand platform. Protect workloads no matter where they run with a single platform that delivers a broad set of security controls. Gain instant visibility into and automatically track security posture of servers in scope of regulations automate compliance with PCI DSS, HIPAA, ISO 27002, and others. Halo Delivers Critical Controls, Anywhere, On Demand. Halo Multi-Factor Network Authenticatio...
cloudpassage.com
Careers | CloudPassage
https://www.cloudpassage.com/careers
Skip to main content. Your Future is Here. Innovate and Problem Solve on the Front Lines of Cloud Computing and Security. Work With the Best and Brightest. At CloudPassage, we are all about making cloud computing more secure by resolving the number one inhibitor to cloud adoption: security. This challenge requires smart, passionate, and creative people. We understand that our most important assets are our team, and we treat and take care of them like family. Eric Hoffman, Director of QA. Opportunity to s...
cloudpassage.com
Security Solutions | CloudPassage
https://www.cloudpassage.com/use-cases
Skip to main content. The Halo On-Demand Platform Solves Real World Challenges. Your Cloud Servers Are Under Attack. How Can You Tell? Reduce Your Attack Surface and Automate Server Protection. Don’t Let Manual Processes Hold Up Compliance. Security at DevOps Speed. Don’t Let Security Put the Brakes on DevOps. Automated, Advanced Security and Compliance for AWS. 2016 CLOUDPASSAGE AND HALO.
SOCIAL ENGAGEMENT