Security Visibility is Mission-Critical

IaaS has continued to evolve and make it easier for companies to set up public cloud infrastructure faster than ever. Many are doing just that and moving more and more workloads to cloud environments. Although in these new, dynamic environments…

Read More

Do you have leaky S3 buckets?

Last year was the year of “leaky buckets,” as in S3 buckets, making some of our worst cloud security fears a reality.  S3, or Simple Storage Service, is a public cloud storage service within Amazon Web Services (AWS). Just a…

Read More

Now available to all Halo users: Cortex v1.1

We’ve just released Cortex v1.1 (https://github.com/cloudpassage/cortex), and while some changes may seem subtle, they greatly improve the functionality and efficiency of Cortex, giving you an even more seamless experience. Some of the changes you’ll see include: File-based configuration for scheduled…

Read More

Securing Jenkins – Fast

Jenkins is one of the most popular open source Continuous Integration (CI) tools available. It’s extremely flexible, easy to use, and it performs a critical function in many agile development situations. Using Jenkins for CI allows developers and DevOps personnel…

Read More

LIDS cross site scripting (XSS) for attack detection

Cross Site Scripting (XSS) is one of the most common application security vulnerabilities and it affects many web applications. XSS attacks occur when an attacker uses a web application to send malicious code (generally in the form of a browser…

Read More

Proactive versus reactive vulnerability management

A career in information security is a trial by fire, one I dove into headfirst when I began career 18 years ago. Challenging problems reared their ugly heads through attacks like NIMDA, CodeRed, SQLSlammer and others. These viruses took advantage…

Read More

Leveraging LIDS – logs and lots more

When it comes to a Log-Based Intrusion Detection System (or LIDS), there’s a lot you can leverage. LIDS is a useful cross-platform, tactical, and supplemental (if you have an existing SIEM) pattern matching system. You can use LIDS to set…

Read More

Introduction to Software Vulnerability Assessment

CloudPassage Halo’s Software Vulnerability Assessment module (SVA), is one of the most critical components of the Halo platform. The SVA module regularly scans all of your protected servers to detect known vulnerable packages, providing universal visibility into your workloads. These…

Read More

Configuration security monitoring with Halo

After taking a brief hiatus, it’s time to return to another segment of Halo explainer videos! This week we’re diving into CSM, or the configuration security monitoring module in Halo. This module is integral to many of our security processes,…

Read More