Lindsey Ullian's Latest Blogs

27 total posts.

5 Min Read
An Inside Look at the Evolution of Threat Stack’s SOC 2 Processes

Lindsey Ullian

January 9, 2020

For the Third Straight Year, the Threat Stack Cloud Security Platform Meets Security and Availability Standards Set by the American Institute of ...

7 Min Read
How SaaS Companies Can Build a Compliance Roadmap

Lindsey Ullian

July 30, 2019

Meeting compliance requirements can be a challenge, but it can also open up new markets, speed your sales process, and improve your company’s ...

3 Min Read
Ensuring Compliance With EU Payment Services Directive (PSD2)

Lindsey Ullian

July 25, 2019

September 14, 2019 is the deadline by which all payment service providers within the European Union must comply with PSD2’s Regulatory Technical ...

3 Min Read
Threat Stack Successfully Completes Type 2 SOC 2 Examination With Zero Exceptions — Again!

Lindsey Ullian

February 20, 2019

For the second year in a row Threat Stack has achieved Type 2 SOC 2 Compliance in Security and Availability with zero exceptions. We’re justifiably ...

4 Min Read
Aligning SecOps Teams With Compliance Roadmaps

Lindsey Ullian

December 4, 2018

Compliance is essential, and organizations need to get it right. Despite the importance of compliance, organizations often treat it as an ...

4 Min Read
Top Compliance Pain Points by Industry

Lindsey Ullian

August 30, 2018

Whether you are adhering to mandatory regulations or voluntary cybersecurity frameworks, taking compliance seriously can be a huge boon to your ...

3 Min Read
What is the NIST Cybersecurity Framework?

Lindsey Ullian

July 31, 2018

You’ve SOC 2-ed from here to eternity, and you’ve got GDPR in the bag, but if you’re truly focused on security maturity, you know that your ...

4 Min Read
What is AWS PCI Compliance?

Lindsey Ullian

June 12, 2018

A Definition of AWS PCI Compliance, Benefits, Requirements, & More If your organization processes credit or debit card payments, PCI compliance ...

3 Min Read
GDPR: What Compliance Says vs. What DevOps Hears

Lindsey Ullian

May 22, 2018

The deadline for the General Data Protection Regulation (GDPR) is fast approaching, with May 25 marking the official day of reckoning. The updates to ...

4 Min Read
Are You Ready for GDPR Compliance? Here’s a Checklist.

Lindsey Ullian

March 28, 2018

The European Union’s General Data Protection Regulation (GDPR) is going into effect in just two months — on May 25, 2018. Yet a recent Forrester ...

4 Min Read
Threat Stack Successfully Completes Type 2 SOC 2 Examination

Lindsey Ullian

February 20, 2018

Threat Stack is proud to announce that we have successfully completed a Type 2 SOC 2 examination for the Security and Availability principles with ...

3 Min Read
9 Common Questions About SOC 2 Compliance

Lindsey Ullian

August 1, 2017

SOC 2 compliance is a crucial framework for technology and cloud computing companies today. As with many other compliance mandates, it is not a ...

3 Min Read
How to Verify That Compliance Controls and Processes are Being Met

Lindsey Ullian

November 15, 2016

Compliance is a complex, ongoing process. Between deciphering requirements into relatable terms, allocating a budget, and  assembling a team for ...

4 Min Read
The Ultimate Compliance Cheat Sheet: A Wrap Up of Threat Stack’s Cloud Compliance Series

Lindsey Ullian

October 7, 2016

We write about compliance (and talk to customers about it) pretty regularly, and if you’ve been following our blog over the last two months, then ...

5 Min Read
Allocating Resources for a Compliance Audit: A Practical Framework

Lindsey Ullian

October 6, 2016

When companies prepare to meet compliance, whether it’s PCI DSS, HIPAA, or SOC 2, one thing that can be estimated inaccurately is the stakeholders ...

7 Min Read
When is Good Enough Good Enough? Meeting Compliance Without Losing Your Mind

Lindsey Ullian

September 30, 2016

Have you heard one about the bear and the two hikers? A bear jumps out of the bush and starts chasing two hikers. They both start running for their ...

6 Min Read
File Integrity Monitoring and Its Role in Meeting Compliance

Lindsey Ullian

September 27, 2016

When’s the last time someone made an unauthorized change to your system files? To answer this and other important security questions, as well as to ...

4 Min Read
Budgeting for a Compliance Audit: A Practical Framework

Lindsey Ullian

September 21, 2016

Companies can easily underestimate the investment required to meet compliance. Thinking compliance is a one-and-done activity that you can skate by ...

< 1 Min Read
The Compliance Playbook: How to Build PCI & HIPAA Compliant Businesses in the Cloud

Lindsey Ullian

September 14, 2016

The Threat Stack Compliance Playbook for Cloud Infrastructure is now available! The Compliance Playbook is intended for readers who want to ...

4 Min Read
The Importance of Security Monitoring to Achieving Compliance in the Cloud

Lindsey Ullian

September 8, 2016

Monitoring is the most reliable method of identifying and tracking users who are accessing data on company systems. Whether you’re on the lookout ...

3 Min Read
The Impact of the Cloud’s Shared Responsibility Model on Compliance

Lindsey Ullian

September 1, 2016

Amazon Web Services (AWS) has pioneered the Shared Responsibility Model in the cloud. Basically, this model outlines how cloud service providers and ...