San Francisco, CA, USA
Jun 6, 2019 | By Gregg Rodriguez
Many knowledgeable opinions, four key takeaways, one gathering of pros. The very first AWS re:Inforce conference is upon us. Thousands of attendees, speakers, and vendors will descend on the Boston Convention Center for the very first AWS-centric security event. If re:Inforce looks anything like other AWS events, you can expect the raw quantity of information to be overwhelming. Pitches, courses, product data sheets, booths – how’s an attendee to get above the noise and focus on what matters?
May 29, 2019 | By Gregg Rodriguez
AWS re:Inforce 2019 may still be a month away, but if you’re like most IT and security professionals you may have your hands full, leaving you with little time to prepare. If so, and you’re planning on attending, don’t worry–we wrote this blog post to help you get started. AWS re:Inforce 2019 will take place June 25 and 26 at the Boston Convention and Exhibit Center.
May 23, 2019 | By Gregg Rodriguez
Global data breaches hit 1,500 in 2018, based on public disclosures, making security and compliance in the cloud a top priority for enterprises. While cloud computing can quickly expand your capabilities and help you achieve your business goals, it also introduces complexity to securing these new computing environments.
May 16, 2019 | By Edward Smith
I’m pleased to announce that CloudPassage’s very own Gregg Rodriguez received a Platinum Hermes Creative Award for his white paper on “Why Security Should Care About ‘The Apple Effect’– How Cloud Computing Unlocks Continuous Innovation.” The CloudPassage white paper examines how Apple’s culture of continuous innovation enabled the company to deliver new products on such a regular basis that consumers now expect that something new is coming. A phenomenon known as “the Apple Effect.”
May 9, 2019 | By Gregg Rodriguez
In 2018 digital transformation became a popular topic of discussion and exploration among enterprises. This year security transformation is becoming a key focus. Roughly nine out of 10 businesses surveyed in 2018 reported having or preparing to implement a formal digital transformation strategy, according to an IDG report.
Feb 25, 2019 | By CloudPassage
Back when IT infrastructures took months to develop and deploy, security and compliance teams had time to configure and release security controls in parallel. But today, high-performing teams deploy on demand or multiple times per day, and they can deploy changes to production in less than an hour. Servers themselves may exist for less than an hour. This rapid pace is leaving security teams behind. And the massive gap between code being deployed within hours and security projects taking weeks puts companies at risk.
Feb 1, 2019 | By CloudPassage
Public cloud use is increasing as organizations leverage IaaS environments to improve operational agility and increase efficiency. However, security teams struggle to maintain security visibility of these dynamic computing environments due to decentralization of IT, the expanding cloud attack surface, and cloud service misconfigurations that create risk.
Jan 1, 2019 | By CloudPassage
CloudPassage® Halo® provides a broad range of security controls that work in any environment. This document will focus on the ease of use and benefits of using Halo in Amazon Elastic Compute Cloud (Amazon EC2) as well as Amazon Elastic Container Service.
Dec 1, 2018 | By CloudPassage
Containers exist as part of a continuum from centralized mainframes to clustered servers, virtual machines, and ultimately containers. Containers, like all technology, must be used strategically. As one of many possible architectures for deploying services and applications, how one chooses may determine success or failure.
Nov 1, 2018 | By CloudPassage
This paper provides guidelines and recommendations for selecting and planning the implementation of Kubernetes-managed overlay networks. This paper examines the implementation of the Flannel, a popular overlay network, within the context of the design considerations set forth in this document.