Category Archives: Blog

RSAC 2015: A Retrospective
This year, RSA Conference boasted over 33,000 in attendance and featured 290 different sessions and 700 speakers. All of the technologies and parties that people have come to …

May 19, 2015 //

Read more ›

VENOM: A Good Excuse to Review Your Vulnerability Response Plan
On Tuesday, researchers from CrowdStrike disclosed a potentially dangerous vulnerability, “Virtualized Environment Neglected Operations Manipulation” (VENOM), which allows attackers to escape a virtual machine and access any virtual …

May 14, 2015 //

Read more ›

Posted by: Steve Salinas, Director of Product Marketing

Comments Off on VENOM: A Good Excuse to Review Your Vulnerability Response Plan

Your Role in AWS Application Security
Amazon’s inclusion of Amazon Web Services (AWS) revenue ($6 billion) in their most recent quarterly earnings release validates the continued broad appeal and adoption of the leading cloud …

May 06, 2015 //

Read more ›

Untangling the Shared Responsibility of Cloud Security
Back in the initial days of cloud computing, AWS came out with clear and concise statement on shared security: AWS will take responsibility from the “concrete to the …

May 05, 2015 //

Read more ›

5 Things We Learned at AWS Summits (San Francisco and London)
Now that we’re back from the two most recent AWS Summits in San Francisco and London, we’d like to reflect on five things we discovered along the Road …

April 23, 2015 //

Read more ›