Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

2 Min Read
Happy Compliance Audit Season!

Rob Young

January 21, 2021

While many organizations are wrapping up their cloud security compliance audits for the season, we know at Threat Stack that the work of ensuring ...

7 Min Read
Why Alerts per Day is a Misleading Metric for Security Teams

Sam Bisbee

January 12, 2021

Over the last six and a half years we have worked with thousands of companies of all sizes and maturities on implementing threat detection for their ...

11 Min Read
Rationalizing Data Science, Machine Learning, and Change Management for Security Leadership

Sam Bisbee

January 11, 2021

At first glance data science and machine learning conflict with security best practices. Data science and engineering teams need access to ...

3 Min Read
Five Cloud Security Myths

Rob Young

January 7, 2021

The pandemic will have a lasting, long-term effect on IT, and one of the most important will be even faster migration to the cloud, according to ...

3 Min Read
An Open Letter to Security Vendors’ Predatory Use of Public Breaches

Sam Bisbee

December 11, 2020

Disclaimer: This post discusses a breach that is reportedly under active investigation. I have not spoken with the FireEye team about this incident, ...

4 Min Read
Establishing a 2021 Cloud Security Strategy

Rob Young

November 17, 2020

In early 2020, organizations were already moving quickly towards the cloud before the COVID-19 pandemic put their journey into fifth gear. How fast ...

3 Min Read
Overcoming the Cloud Security Skills Shortage by Encoding Expertise

Jackson Connell

October 15, 2020

In case you missed them, in recent blogs we did a deep dive into Threat Stack’s ability to provide extensive cloud security telemetry and hinted at ...

3 Min Read
Security Rules with Anomaly Detection: Capture the Known and the Unknown

Mike Broberg

October 7, 2020

Any cybersecurity team that has had to respond to a compliance audit knows that it’s a lot easier to monitor for specific risks as they occur, ...

5 Min Read
Accelerate Security with Threat Stack Telemetry

Mike Broberg

September 23, 2020

There’s a lot of value in Threat Stack’s deep, continuous telemetry. By casting a wide net, our customers get the complete story about what’s ...

15 Min Read
The 50 Best AWS Fargate Tutorials

Jackson Connell

September 21, 2020

Amazon Web Services (AWS) Fargate is a compute engine for Amazon Elastic Container Service (ECS). With Fargate, you don’t need to provision and ...

15 Min Read
50 Best AWS CloudWatch Tutorials

Jackson Connell

September 10, 2020

AWS is one of the largest and most popular cloud computing platforms. Amazon first began offering IT infrastructure services to businesses back in ...

5 Min Read
Optimizing Threat Stack’s Data Pipeline with Apache Spark and Amazon EMR

Mina Botros

August 11, 2020

Threat Stack collects tens of billions of events per day, which helps customers understand their environment, identify undesirable activity, and ...

3 Min Read
Introducing Threat Stack support for AWS Fargate

Ivan Evsyukov

August 4, 2020

As customers evaluate and design new forms of managed container architectures, Threat Stack will be there to provide a detailed view into running ...

21 Min Read
Tips on Choosing the Best Free DevOps Tools

Mike Broberg

July 30, 2020

Free and open source DevOps tools can help DevOps teams streamline their development processes and speed development cycles, when carefully selected ...

6 Min Read
40 Essential Cloud Security Blogs for IT Professionals

Jackson Connell

July 9, 2020

As the rapid adoption of new ephemeral cloud deployment options, like containers and kubernetes, gives DevOps teams more flexibility, it is more ...

7 Min Read
System Access and User Accountability in the Cloud

Mike Broberg

June 18, 2020

Evaluating Your Security Mechanisms Throughout the IT industry, security mechanisms are used to allow or deny access to objects, such as a file, by ...

16 Min Read
50 Best Online DevOps Training Resources

Jackson Connell

June 10, 2020

Every company that uses applications in one way or another must operate in a service-oriented digital world where application development has to be ...

6 Min Read
The Curious Case of the Sunday Morning Alarm: Debugging Disk Performance in the Cloud

Pat Cable

June 9, 2020

Threat Stack has an event processing pipeline that processes millions of messages per second sent to us by customer agents, our internal services, ...

15 Min Read
50 Best Deployment Tools

Pan Chhum

June 3, 2020

Let's be honest: trying to deploy your apps alone is a bad idea. Trying to upgrade and configure hundreds of computers across an extensive ...

14 Min Read
50 Best HIPAA Training Resources

Jackson Connell

May 27, 2020

It’s not just healthcare providers who handle protected health information (PHI), but also a growing number of companies in the broader health and ...

14 Min Read
50 Best Integration Testing Tools

Jackson Connell

May 21, 2020

Testing the applications you create is a necessary part of writing code. Finding the right tools to perform different testing functions can be ...