San Francisco, CA, USA
Aug 27, 2019 | By Amol Sarwate
Here at CloudPassage, we’ve been researching how public data can be used for real-time vulnerability alerting using principles from the United States Tsunami Warning Center. I am excited to announce that we will be presenting and demonstrating initial results from this research at the OWASP Global AppSec 2019 conference in Washington DC. Please join our session on vulnerability alerting and threat intelligence on September 13 at 4:30 pm.
Aug 21, 2019 | By Amol Sarwate
On July 29, it was announced that there was a Capital One cloud data breach. A hacker had accessed about 100 million credit card applications, and investigators say thousands of Social Security and bank account numbers were also taken. This comes on the eve of the news that Equifax has reached a $700 million settlement with U.S. regulators over stolen personal information for 147 million records in 2017. Are compromises like these preventable? Absolutely yes.
Aug 14, 2019 | By Richard Guth
In the wake of the recent Capital One security breach in their cloud environment on AWS, the security community is taking another look at how we approach cloud security. CloudPassage recently shared guidance in our blog, “Capital One Data Breach: Non-Technical Tips To Not Be A Headline”. Here we take a look at how your industry peers are thinking about focusing on what matters by taking a look at the 2019 AWS Security Report.
Aug 8, 2019 | By Cloudpassage
In the last 48 hours, we’ve received dozens of messages asking about the recent Capital One data breach, detailed in this New York Times article. A similar data breach happened in April involving half a billion Facebook records in another cloud-related headline hack, and we had a similar influx from concerned AWS and Azure cloud users.
Jul 29, 2019 | By Gregg Rodriguez
Public cloud infrastructure is a significant and powerful part of an enterprise’s competitive arsenal but to protect such fast-moving environments requires such as Iaas require cloud security automation. In our cloud-driven economy, software has become the battleground of innovation, and public cloud infrastructure, or IaaS, — along with its cousins, DevOps and Continuous Delivery — offers the strategic advantage of speed.
Feb 25, 2019 | By CloudPassage
Back when IT infrastructures took months to develop and deploy, security and compliance teams had time to configure and release security controls in parallel. But today, high-performing teams deploy on demand or multiple times per day, and they can deploy changes to production in less than an hour. Servers themselves may exist for less than an hour. This rapid pace is leaving security teams behind. And the massive gap between code being deployed within hours and security projects taking weeks puts companies at risk.
Feb 1, 2019 | By CloudPassage
Public cloud use is increasing as organizations leverage IaaS environments to improve operational agility and increase efficiency. However, security teams struggle to maintain security visibility of these dynamic computing environments due to decentralization of IT, the expanding cloud attack surface, and cloud service misconfigurations that create risk.
Jan 1, 2019 | By CloudPassage
CloudPassage® Halo® provides a broad range of security controls that work in any environment. This document will focus on the ease of use and benefits of using Halo in Amazon Elastic Compute Cloud (Amazon EC2) as well as Amazon Elastic Container Service.
Dec 1, 2018 | By CloudPassage
Containers exist as part of a continuum from centralized mainframes to clustered servers, virtual machines, and ultimately containers. Containers, like all technology, must be used strategically. As one of many possible architectures for deploying services and applications, how one chooses may determine success or failure.
Nov 1, 2018 | By CloudPassage
This paper provides guidelines and recommendations for selecting and planning the implementation of Kubernetes-managed overlay networks. This paper examines the implementation of the Flannel, a popular overlay network, within the context of the design considerations set forth in this document.