Best Practices for Baselining Your Cloud Security Environment

Whether you intend to use managed services to handle your organization’s cloud security or have decided to create and manage your own security program, pulling together all the information you need can be a complex task to say the least. To help out, we want to share some of the insights and best practices we’ve gathered from Threat Stack’s managed security service.

Read more “Best Practices for Baselining Your Cloud Security Environment”

Here’s The One Reason You Actually Should Use Security Point Solutions

Compiling the right set of security solutions to meet your company’s unique requirements is no easy feat. The security needs of each company can vary widely depending on compliance regulations, the industry threat profile and types of data processed, among many other factors. So while the security solutions you ultimately go with may fit the bill for what you need, they often:

Read more “Here’s The One Reason You Actually Should Use Security Point Solutions”

Threat Stack, the XOR DDoS and the Groundhog Variant

While the XOR DDoS Trojan has been active for over a year, we’ve seen a recent surge of coverage and blog posts recently. We’ve also seen the Groundhog variant emerge. This has prompted a few of our customers to ask how their Threat Stack deployment will detect this type of attack and activity as well as what new rules need to be added to detect this.

Read more “Threat Stack, the XOR DDoS and the Groundhog Variant”