Digital transformation requires security transformation

In 2018 digital transformation became a popular topic of discussion and exploration among enterprises. This year security transformation is becoming a key focus. Roughly nine out of 10 businesses surveyed in 2018 reported having or preparing to implement a formal…

Read More

Securing your Azure Storage accounts

Enterprise data is growing exponentially and becoming more complex, making it harder to manage, and an even bigger challenge to store. That’s why more organizations are looking to public cloud storage options, such as Azure Storage, as a way to…

Read More

Using Intel’s Optane SSD storage to dive into Docker’s layers

Background: Containerization is a rapidly growing trend in application hosting infrastructure. There are a number of guiding principles and best practices for building container images (containerization’s analog for virtual-machine images). One guiding principle of containerization is building small, concise, single-concern…

Read More

It’s your data: Halo Events Exporter

Our goal in everything we do here at CloudPassage is to make your life easier. Making your life harder would not only be pretty rude of us, it would also make it far less likely you or anyone else would…

Read More

Establishing a data protection committee for boards

Guest post by Matthew Pascucci, Frontline Sentinel Within certain countries, especially in the European Union, there are certain data protection committee requirements to enforce the privacy and protection of a country’s or an organization’s data. In the United States while we…

Read More

Will we be able to control data in the wild? (Black Hat 2016)

Guest blog by David Spark, Spark Media Solutions “Once the data is out there, it’s out of their control,” said Elliot Lewis (@elliotdlewis), VP of security, risk, and compliance research at Info-Tech Research Group, in our conversation at the Black…

Read More

How microsegmentation helps with applications

Guest post by Matthew Pascucci, Frontline Sentinel One use case for microsegmentation that we haven’t completely touched on in previous posts is the protection of applications within your network. We’ve discussed the use of security as a whole and why…

Read More