San Francisco, CA, USA
Apr 15, 2019 | By Gregg Rodriguez
Enterprise data is growing exponentially and becoming more complex, making it harder to manage, and an even bigger challenge to store. That’s why more organizations are looking to public cloud storage options, such as Azure Storage, as a way to get the scalability, durability, maintenance and accessibility they need to keep them competitive–benefits often difficult to get from on-prem data centers.
Apr 9, 2019 | By Gregg Rodriguez
Last year was the year of “leaky buckets,” as in S3 buckets, making some of our worst cloud security fears a reality. S3, or Simple Storage Service, is a public cloud storage service within Amazon Web Services (AWS). Just a few months into 2019, we are already seeing examples of data breaches occurring, some recent ones due to organizations unknowingly having leaky S3 buckets.
Apr 1, 2019 | By Gregg Rodriguez
The role of containers in cloud computing will continue to grow as new cloud-specific apps are developed–primarily because they are a faster path to better applications. As containers become an essential component of modern IT infrastructure, the importance of container security also becomes more critical. Containers comprised about 19% of hybrid cloud production workloads in 2018, although by 2020, containers will make up one-third of hybrid cloud production workloads, according to ESG research.
Mar 27, 2019 | By Gregg Rodriguez
Web applications are becoming frequent targets of malicious attacks that exploit common vulnerabilities, such as SQL injection attacks or cross site scripting attacks, which makes securing your Azure Application Gateway more critical than ever.
Mar 21, 2019 | By Gregg Rodriguez
Between 2017 and 2021, worldwide spending on cybersecurity will top $1 trillion, according to predictions from Cybersecurity Ventures. The barrage of cyberattacks on enterprises and new threat vectors within networks due to the move to Infrastructure as a Service (IaaS), or public cloud, makes the need for agile security more important than ever for CIOs and CISOs managing cybersecurity.
Feb 25, 2019 | By CloudPassage
Back when IT infrastructures took months to develop and deploy, security and compliance teams had time to configure and release security controls in parallel. But today, high-performing teams deploy on demand or multiple times per day, and they can deploy changes to production in less than an hour. Servers themselves may exist for less than an hour. This rapid pace is leaving security teams behind. And the massive gap between code being deployed within hours and security projects taking weeks puts companies at risk.
Feb 1, 2019 | By CloudPassage
Public cloud use is increasing as organizations leverage IaaS environments to improve operational agility and increase efficiency. However, security teams struggle to maintain security visibility of these dynamic computing environments due to decentralization of IT, the expanding cloud attack surface, and cloud service misconfigurations that create risk.
Jan 1, 2019 | By CloudPassage
CloudPassage® Halo® provides a broad range of security controls that work in any environment. This document will focus on the ease of use and benefits of using Halo in Amazon Elastic Compute Cloud (Amazon EC2) as well as Amazon Elastic Container Service.
Dec 1, 2018 | By CloudPassage
Containers exist as part of a continuum from centralized mainframes to clustered servers, virtual machines, and ultimately containers. Containers, like all technology, must be used strategically. As one of many possible architectures for deploying services and applications, how one chooses may determine success or failure.
Nov 1, 2018 | By CloudPassage
This paper provides guidelines and recommendations for selecting and planning the implementation of Kubernetes-managed overlay networks. This paper examines the implementation of the Flannel, a popular overlay network, within the context of the design considerations set forth in this document.