Ransomware Campaigns Underscore Need for Dynamic Security

Shipping services firm Pitney Bowes has recently joined the growing ranks of businesses targeted by high-impact ransomware attacks—in their case, the Ryuk virus. The Ryuk virus has also been named as the culprit in recent data breaches spanning both global…

Read More

LIDS and FIM Templates for Security Vigilance and Integrity

CloudPassage recently released new templates for Windows 2019 Log-based Intrusion Detection System (LIDS) and File Integrity Monitoring (FIM). In this article, I will go over some use cases and how organizations can use the templates to protect and secure their…

Read More

Security Visibility is Mission-Critical

IaaS has continued to evolve and make it easier for companies to set up public cloud infrastructure faster than ever. Many are doing just that and moving more and more workloads to cloud environments. Although in these new, dynamic environments…

Read More

Security Mistakes and the Culture of Innovation

We live in a culture of rapid innovation, but that innovation can result in a variety of cloud security mistakes. Businesses must innovate quickly to compete in today’s markets, and software and public cloud infrastructure, or IaaS, are significant enablers…

Read More

Real-time Vulnerability Alerting

Here at CloudPassage, we’ve been researching how public data can be used for real-time vulnerability alerting using principles from the United States Tsunami Warning Center. I am excited to announce that we will be presenting and demonstrating initial results from…

Read More

Do you have leaky S3 buckets?

Last year was the year of “leaky buckets,” as in S3 buckets, making some of our worst cloud security fears a reality.  S3, or Simple Storage Service, is a public cloud storage service within Amazon Web Services (AWS). Just a…

Read More

Protecting Your Cloud-Based Relational Databases

As more enterprises move more sensitive data to the cloud, how you secure  and protect your public cloud services and resources is critical. While Amazon does a stellar job of securing the underlying server hardware and software as their part…

Read More

Creating a Culture of Cybersecurity

Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you…

Read More