On August 10, 1628, the Swedish warship Vasa began its maiden voyage, and after sailing approximately 1,400 feet, promptly heeled over and sank, causing total loss of the ship as well as the deaths of 53 sailors.
What does this have to do with project managing large, complex software systems? Find out by joining Threat Stack’s Pete Cheslock at Monitorama in Portland, Oregon, May 22–24. Read more “Join Threat Stack’s Pete Cheslock at Monitorama 2017”
In the past, we’ve talked about various ways that compliance can add value to your business. But what happens when you don’t attain or maintain compliance. (Note: In the following, we focus on PCI, but equally unpleasant consequences can result, of course, if you fail to meet other standards such as HIPAA, SOC 2, etc.). Read more “Meeting Compliance in the Cloud ≠ A Choice”
Threat Stack Delivers Wake Up Call
Wide open SSH and infrequent software updates among top risks identified in the majority of cloud-based environments
How effective are your AWS security configurations? And how do you know for sure?
In a recent eye-opening study, Threat Stack found that 73% of companies have at least one critical security misconfiguration, such as remote SSH open to the entire internet. By “critical”, we mean configuration lapses that enable an attacker to gain access directly to private services or the AWS console, or that could be used to mask criminal activity from monitoring technologies.
If we caught your attention with that opening statistic, please read on. Read more “73% of Companies Have Critical AWS Security Misconfigurations”