Come see us at Black Hat!


This post was originally published here by casey pechan.

Black Hat is fast approaching and we could not be more excited! We have some great partnerships to discuss, a major overhaul of our processing grid to show off, and a Halo Rover hoverboard to give away.


Our theme is summer-movie-blockbuster Cloud At Last (like Cloud Atlas, get it)? And we can’t wait to show you what truly automated cloud security looks like.

Here are all the ways you can find us and take advantage of Black Hat, from July 22-27:

Visit us at booth #1853 at the Mandalay Bay Expo Hall

Stop by our Cloud At Last booth for a chance to win a Halo Rover hoverboard, or chat with us about our partnerships and the big changes we’ve made to our Halo platform. As you know, we’re an approved module for Puppet, and between the two of us we’re making it easy to automate your compliance, and streamline and secure your workloads and containers.

We would love to stop by so we can tell you all about our new security analytics engine Just last month we unveiled the CloudPassage next-generation (NG) analytics engine, which will enable you to get more meaningful information, faster, from Halo.

Catch our speaking sessions!

Be sure to check out the whiteboard sessions that will be taking place in our booth. The schedule will be displayed in our booth when the event starts. And of course, we’ll have experts at the booth to answer any questions you may have.

Topics include:

  • Automated workload security
  • Cloud security for containers
  • Automated compliance at DevOps speed
  • How automated security fits into DevOps toolchain
  • CloudPassage Halo use-case featuring Aaron McKeown, Security Engineering & Architecture at Xero


See below for information about our own strategic engineering specialist Ash Wilson’s speaking session at Black Hat!

Wednesday, July 26th from 12:30 – 1:30pm

SITCH: Distributed, Coordinated GSM Counter-Surveillance

SITCH uses inexpensive hardware and open-source software to create a network of sensors for detecting malicious activity in GSM wireless networks. SITCH sensors are based on the Raspberry Pi 3 platform and use inexpensive, easy-to-source software-defined, GPS, and GSM radios. One person can manage a large number of SITCH sensors, including on-the-fly configuration and firmware updates, from a web browser.

If you haven’t already, don’t forget to register for Black Hat. You won’t want to miss this year’s event.


No posts to display