From Agent Install to Mean Time to Know in Less Than 5 Minutes

They say timing is everything — and when you go from installing an agent to detecting and remediating a security breach in less than 5 minutes, it just doesn’t get any better.

We want to share an awesome story about how one of our customers recently caught a breach within seconds of installing Threat Stack.

Read more “From Agent Install to Mean Time to Know in Less Than 5 Minutes”

How Compliance in the Cloud Can Strengthen Your Business

Often companies think of compliance as an annoying imposition — something to grin and bear. And while achieving compliance is not always a cakewalk, the upside of doing so can be huge. Whether you are interested in starting a company, entering a new market, or winning  new customers, achieving compliance can be a major business driver. Here’s why it’s beneficial to your bottom line to think about compliance in this way.

Read more “How Compliance in the Cloud Can Strengthen Your Business”

Announcing Threat Stack’s Compliance Blog Post Series

PCI DSS. HIPAA. SOC 2. SOX 404. Compliance can be a complicated and confusing beast, with plenty of acronyms and layers of regulations — not to mention expenses and stress. But achieving compliance in the cloud can also be the key to unlocking new sources of revenue, winning business, and achieving success in today’s competitive business environment.

Read more “Announcing Threat Stack’s Compliance Blog Post Series”

Best Practices for Baselining Your Cloud Security Environment

Whether you intend to use managed services to handle your organization’s cloud security or have decided to create and manage your own security program, pulling together all the information you need can be a complex task to say the least. To help out, we want to share some of the insights and best practices we’ve gathered from Threat Stack’s managed security service.

Read more “Best Practices for Baselining Your Cloud Security Environment”

Here’s The One Reason You Actually Should Use Security Point Solutions

Compiling the right set of security solutions to meet your company’s unique requirements is no easy feat. The security needs of each company can vary widely depending on compliance regulations, the industry threat profile and types of data processed, among many other factors. So while the security solutions you ultimately go with may fit the bill for what you need, they often:

Read more “Here’s The One Reason You Actually Should Use Security Point Solutions”

Threat Stack, the XOR DDoS and the Groundhog Variant

While the XOR DDoS Trojan has been active for over a year, we’ve seen a recent surge of coverage and blog posts recently. We’ve also seen the Groundhog variant emerge. This has prompted a few of our customers to ask how their Threat Stack deployment will detect this type of attack and activity as well as what new rules need to be added to detect this.

Read more “Threat Stack, the XOR DDoS and the Groundhog Variant”