Threat Stack Welcomes New Massachusetts Cybersecurity Growth and Development Center
Last week, during the inaugural Cybersecurity Forum, Massachusetts Governor Charlie Baker announced the brand new, Cybersecurity Growth and Development Center at the Massachusetts Technology Collaborative. The goal of the new public institution is to unite the cybersecurity sector in Massachusetts, while also training new talent — a huge win given the acute skills shortage that exists today. At Threat Stack, we couldn’t be more pleased or supportive. Read more “Massachusetts Takes Leadership Role in Cybersecurity”
This is another landmark day in Threat Stack’s growth: It’s with great excitement that we announce that Threat Stack has secured $45 million in a Series C funding round led by F-Prime Capital Partners (the venture capital group associated with the parent company of Fidelity Investments), and Eight Roads Ventures, along with participation from existing investors Scale Venture Partners, .406 Ventures, and Accomplice.
Leveraging strong customer adoption and robust organic growth, we have set our sights on expanded opportunities in existing markets as well as entry into new sectors. Further investment in innovation will consolidate Threat Stack’s leadership in the cybersecurity market as we continue to develop the industry’s most comprehensive intrusion detection platform for cloud, hybrid-cloud, and on-premise environments.
Read more “Threat Stack Raises $45M in Series C Funding to Accelerate Cybersecurity Innovation & Market Expansion”
With 2016 nearing an end, I can’t help reflecting on how fortunate I am in my personal and professional life. I am blessed with a beautiful, supportive family as well as the opportunity to work with a great team of employees, investors, board members, and customers at Threat Stack.
Read more “Threat Stack Supports Tech Gives Back & St. Baldrick’s”
As we enter the “dog days of summer,” we can’t help but reflect on the many events — regional, national, and global — that have been swirling around us throughout 2016.
Read more “Innovation and a Results-Oriented Culture Continue to Drive Success”
On Monday I had the pleasure of watching the Boston Marathon and cheering on thousands of runners: some running for results, many running for a worthy cause, but all running with the common objective of ACHIEVEMENT!
Read more “A Big Week: Threat Stack, Fundraising, and the Boston Marathon”
You know that feeling you got as a kid the night before your birthday? That’s been us over at Threat Stack for the last few months. It’s taken all the willpower we could muster to keep it a secret, but today we’re letting the cat out of the bag. We’re thrilled to announce the brand new Threat Stack Cloud Security Platform® (or CSP, as we like to call it), the industry’s first fully integrated cloud security suite. Cloud-native and platform-independent, the Threat Stack CSP measurably reduces the expense and complexity required to identify threats, keep data protected and automate compliance requirements.
Intrigued? Read on…
Read more “Announcing Threat Stack Cloud Security Platform”
As businesses move to the cloud, the rapid adoption of Infrastructure as a Service (IaaS) is no surprise. Unfortunately, securing the cloud and the data within it is no easy task. The speed and complexity of cloud computing requires a new, software-defined approach that differs from the strategies employed in a traditional, on-premise data center, leaving many wondering where to start.
For all the benefits that the cloud has to offer, some of the biggest causes for concern are questions around security. How do you know if you were breached if the server no longer exists? How do you protect yourself from insider threats, external attacks, and data loss in this new elastic, ever changing infrastructure? How can you have confidence that your cloud service providers security capabilities are up to snuff, when you don’t have visibility into who is accessing your data?
Look no further than the headlines to know that efforts to protect the cloud from attacks often fail. After attackers compromised the company’s Amazon Web Services (AWS) account, Code Spaces, a cloud-based hosting platform that enabled development and collaboration for software teams, was forced out of business. Within 12 hours the company’s Apache Subversion repositories and Elastic Block Store volumes and nearly all of its virtual machines were destroyed. By the time the company reclaimed its dashboard, the attackers had created alternative AWS logins, questioning the overall security of the system further. The company chose at that point to shut down and help its customers migrate any recoverable data to other services.
Read more “Turn the Cyber Kill Chain against your attacker”
Speaking recently in a Google webcast, U.S. CIO Tony Scott declared major cloud providers like Google, Amazon or Microsoft just as secure as the world’s largest financial institutions. He even implied that there’s no safer place to store data than in the cloud.
Read more “Trust the cloud, they said. It’ll be safe, they said.”
As National Cyber Security Awareness month comes to a close, it seems appropriate to reflect on the state of cyber security today. The ugly truth is that the cyber threat environment has never been more volatile. Breaches are commonplace, headlines on data loss and sophisticated hacks bombard us daily and technology continues to progress and move forward, in spite of security concerns and compromise. A huge portion of the general population’s personal data is exposed and, while seemingly everyone is aware there’s a problem, few are willing to take the preventative measures necessary to stop it.
Read more “Observations as Cyber Security Awareness Month Comes to a Close”
Security is a major concern and potential road block for companies starting up in the cloud or considering a move into the cloud. Incidents such as the most recent high-profile attack on “online cheating site” Ashley Madison do little to assuage those fears as companies must consider how to best protect themselves from external and insider threats
Read more ““The Call is Coming from Inside the House” Insider Threats Pose Major Security Concerns for Enterprise”