We’ve got some outstanding news to share: Threat Stack has just achieved Amazon Web Services (AWS) Security Competency!
This further demonstrates our commitment to delivering best-in-class security — and more specifically, to giving AWS customers exactly what they need in security solutions. As we like to say, “Our solutions are built in AWS to serve AWS.” Read more “Threat Stack’s Cloud Security Platform® Achieves AWS Security Competency”
There are a few things you just don’t leave home without — your keys, your wallet and usually, a large cup of coffee. These are the daily tools you use to get in and out of places, acquire things you need, and keep you alert and energized. This is not much different from your daily cloud security needs. Your organization needs to be fully equipped and protected across all aspects of your cloud environment to be prepared for whatever life throws at it.
Read more “Does Your Cloud Security Strategy Include These 5 Things?”
Dr. Watson is the intellectual and gentlemanly sidekick of fictional detective Sherlock Holmes. With Watson at his side, Sherlock is able to better navigate the complexities of human emotion (not his forte), so Sherlock leans on Watson, and understandably so. They make a good pair.
But while Watson is able to solve the odd mystery himself, only the highly observant Sherlock, with his machine-like analytical mind, is able to produce the insight needed to crack their toughest cases.
You can think of cloud security in the same way. A basic cloud security system will probably alert you to many of the biggest, most obvious attacks. But without sufficient context, you won’t be able to see the full scope of impact. You won’t know where it has spread in your system or what kind of damage it has done. Even if you manage to stop it in one area, you may not succeed in defeating it, and the ramifications can be distressing.
Cloud context gives you the clarity of a Sherlock Holmes.
Recently, we had a conversation with Threat Stack customer Simple, an exciting, high-growth company that’s reinventing online banking. The case study below demonstrates how Simple leveraged Threat Stack to simplify its cloud security and gain more visibility into the operating systems of its production environment. Read on to learn more about how Simple consolidated its security efforts with Threat Stack and how they were able to accelerate their overall company growth, as a result.
Read more “New Case Study: Simplifying Cloud Security and Accelerating Company Growth”
In today’s volatile threat environment, it has become a board-level necessity to find ways to minimize the exposure, liability and risk to personal health information (PHI). One of the best ways to do this is to ensure you are meeting all relevant compliance obligations and requirements. However, most companies simply tick the checkboxes and move on, putting security aside until the next big audit or threat comes along. With today’s threat landscape evolving as you read these very words, this is no longer enough.
Read more “Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take”
This post is part of a series in which we review key cloud security topics from our most-read blog posts from 2015.
Read more “5 Posts to Revisit Before 2016 – #2 Identifying Insider Threats Within Your Docker Containers”
2015 was an important year for cloud security, due in part to the slew of high-profile data breaches that occurred (Ashley Madison and VTech, for example) and also the technological adoption and innovation those events inspired. With just a just over a week until 2016 arrives, we thought we’d review our top 5 blog posts from the year, and revisit the key cloud security themes they cover.
Read more “5 Posts to Revisit Before 2016 – #1 Who Watches the Watchmen?”