POSTS CATEGORIZED UNDER

security-compliance

May 23rd, 2016

13 minute read

 

"Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography." —Bruce Schneier

 

Cryptographic hashes (or one-way hash functions) allow us to compute a digest that uniquely identifies a resource. If we make a small change anywhere in a resource, its digest also changes—drastically, because of the .

January 11th, 2016

3 minute read

UPDATE, 1/12/16

 

Our own Alex Schoof spoke at Velocity EU 2015 in Amsterdam on managing secrets at scale in the cloud. It was a highly rated talk that earned a write-up in InfoQ. Alex will be presenting this talk at tonight’s DevOps DC Meetup in Arlington, VA.

 

You can view the slides from his talk on SlideShare and view his talk on Vimeo.

April 20th, 2015

7 minute read

At Re:Invent 2014 , AWS launched their new Key Management Service , or KMS. As its name implies, KMS is an AWS service that helps securely manage encryption keys in the cloud. Traditionally, keys have been managed in haphazard ways, from SCP-ing keys around your instances to baking them into machine images. The safe way to manage high-value keys.
April 16th, 2015

6 minute read

If you work with network infrastructure, you know that it has a tendency to grow warts, that is, it drifts from its original configuration. One of our goals in building Fugue as the operating system (OS) for the cloud and a single source of truth and trust for your infrastructure is to prevent this drift from occurring by maintaining your.
May 19th, 2014

1 minute read

We’re thrilled to have won the top prize in the InvestMaryland Challenge , (cybersecurity category) last night. It was a fun evening, and we’re honored to have won in a category with such tough competitors including Light Point Security and fellow Core Capital Partners and NEA portfolio company ZeroFox . Congrats to all the winners and finalists!

 

May 11th, 2014

1 minute read

From Lizzy McLellan’s article on Luminal in The Daily Record:

The exterior walls of Luminal’s downtown Frederick headquarters are made of brick. But the company isn’t focused on walls. Its software aims to make a computer system more secure from the inside, instead of relying only on exterior defenses.

Read the full article in PDF format.

January 21st, 2014

3 minute read

 

Startups don't care about security.

 

We hear this a lot. It may be a descendant of "developers don't care about security… that's InfoSec's concern," a situation where at least someone in the organization was paying attention to security. In the developer-dominated world of tech startups, such a statement would be nonsensical. If a startup.

December 19th, 2013

3 minute read

Software agents are everywhere in the cloud. These little programs perform often complex or repetitive functions on our behalf so we don't have to. Some agents help us keep our systems updated and avoid configuration drift. Others roam our compute infrastructure in an attempt to keep everything safe from threats. Software agents are designed to.

Jump to Page

1 2 3 4 5

Secure Your Cloud

Find security and compliance violations in your cloud infrastructure and ensure they never happen again.