Come see us at Black Hat!

This post was originally published here by casey pechan. Black Hat is fast approaching and we could not be more excited! We have some great partnerships to discuss, a major overhaul of our processing grid to show off, and a Halo Rover hoverboard to give away. Our theme is summer-movie-blockbuster Cloud At Last (like Cloud Atlas, get it)? […]

Using Intel’s Optane SSD storage to dive into Docker’s layers

This post was originally published here by ash wilson. Containerization is a rapidly growing trend in application hosting infrastructure. There are a number of guiding principles and best practices for building container images (containerization’s analog for virtual-machine images). One guiding principle of containerization is building small, concise, single-concern images. The flexibility of the tools (Docker, for instance) […]

Learn all about automated compliance in our latest webinar

This post was originally published here by casey pechan. At this point, nearly every organization is held to some sort of compliance standard. Where there are customers, there are security specialists working on protecting their data in order to stay within compliance. And while most organizations agree that it’s best to automate and streamline business […]

Petya / GoldenEye is spreading. Here’s how Halo can help.

This post was originally published here by leslie devlin. The latest wave of ransomware, Petya/GoldenEye, started hitting Ukraine, Russia and western Europe earlier today and has already brought down critical infrastructure. Among those confirmed as impacted are Kiev’s main airport and metro system, Ukraine’s state power company, and several large banks, healthcare companies and manufacturing […]

What is up with HIPAA?

This post was originally published here by mark aklian. After almost 20 years in IT, people still tell me I’m crazy when I say that I sincerely enjoy compliance. I enjoy dealing with lawyers, love audit and compliance teams, and writing service provider security requirements documents. Having been on the enterprise financial side of tech […]

Do more CISOs mean a greater focus on security concerns?

This post was originally published here by shaane syed. In early 2016 the percentage of enterprise organizations with Chief Information Security Officers (CISOs) in their C-Suites stood at 50%. In early 2017 that number has already leapt to 65%, representing a 30% increase in just a single year. This seems to indicate organizations are truly […]

14 reasons why agent-based scanning is better than appliance-based vulnerability scanning

This post was originally published here by cliff turner. Constant security scans can be headache, and finding the best tool for the job can be even more of a nightmare. There’s plenty of conflicting information circulating about what will be best for your business. Should you get an agent-based scanning tool, or rely on appliance-based […]

What is automated compliance?

This post was originally published here by cliff turner. Working in cyber security we’re all familiar with the need for IT compliance and know that organizations processing sensitive information (e.g. hospitals, banks) must adhere to a set of rules, standards, and processes protecting customer and user information. However as IT application development and deployment environments […]

Managing servers and installing agents on the new Halo interface

This post was originally published here by leslie devlin. In the second series of our explainer video blog posts, we’re breaking down how to install agents and manage servers on the new Halo interface. We have a feeling you’re going to like the changes, and the ease of use that comes along with them. Installing agents […]

Webinar: Real DevSecOps for the security practitioner

This post was originally published here by  casey pechan. While many companies have begun implementing DevOps into at least one, if not several departments, different approaches to DevOps have complicated the industry and have made many practitioners wonder if security will ever be able to keep up. In his webinar hosted by the SANS Institute, CloudPassage […]

CloudPassage Halo is an on-demand, automated security platform that works in any infrastructure, at any scale. Halo is delivered as a service, so it deploys in minutes and scales dynamically — with no servers to provision and configure. With Halo, our customers deploy layered security at every workload – servers, virtual machines, cloud instances and containers.
Share this page