.

CloudPassage

Benefits of Serverless Computing

This post was originally published here by gregg rodriguez.Many organizations are in a transition, operating somewhere between traditional and modern application environments, and asking...

New: Weekly Halo Cloud Secure Demos

This post was originally published here by gregg rodriguez.The New Year is a time to celebrate new beginnings. Starting over with a clean slate...

Benefits of Serverless Computing

Many organizations are in a transition, operating somewhere between traditional and modern application environments, and asking some of the same questions you likely have...

New: Weekly Halo Cloud Secure Demos

The New Year is a time to celebrate new beginnings. Starting over with a clean slate of resolutions, goals, launches, etc. That’s the good...

Best Practices for Securing AWS Lambda

We’re hearing more and more about services that are not based on traditional server models, such as Amazon S3 buckets—basically big buckets of storage...

5 Common DNS Attacks

The Domain Name System (DNS) security directly impacts both end users and service providers, as the system’s critical nature makes it a sought-after target...

Best Practices for Securing Cloud-Hosted DNS Services like Amazon Route 53

This post was originally published here by gregg rodriguez.Amazon Route 53 is a highly available and scalable cloud-based Domain Name System (DNS) web service...

Best Practices for Securing Cloud-Hosted DNS Services like Amazon Route 53

Amazon Route 53 is a highly available and scalable cloud-based Domain Name System (DNS) web service offered within AWS. Like any DNS, Route 53...

Mitigating the First Major Kubernetes Vulnerability

This post was originally published here by  siri oaklander.Recent news on the discovery of the first Kubernetes vulnerability, the popular cloud container orchestrations system, highlights two...

Mitigating the First Major Kubernetes Vulnerability

Recent news on the discovery of the first Kubernetes vulnerability, the popular cloud container orchestrations system, highlights two things critical to security, the need to: Audit...

http://www.cloudpassage.com

CloudPassage Halo is an on-demand, automated security platform that works in any infrastructure, at any scale. Halo is delivered as a service, so it deploys in minutes and scales dynamically — with no servers to provision and configure. With Halo, our customers deploy layered security at every workload – servers, virtual machines, cloud instances and containers.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!