Today we are pleased to announce the appointment of Brian Ahern as our new Chairman and Chief Executive Officer here at Threat Stack. Passionate about building companies around disruptive technologies, Brian comes to Threat Stack from Industrial Defender, a global leader in cybersecurity, compliance and change management solutions for industrial control systems, where he was Founder and CEO.
We’re thrilled to announce today that Threat Stack has joined PagerDuty’s rapidly expanding partner ecosystem with a new integration now available to all customers! This integration allows you to easily manage your Threat Stack cloud security incidents directly within PagerDuty, a popular platform that allows engineering and IT teams to connect their operations systems, teams and data into a single, easy-to-use console, making managing and responding to incidents quick and easy.
We recently spoke with Threat Stack customer Jameel Al-Aziz, DevOps/Software Engineer for 6sense, and developed the following case study that showcases how Al-Aziz and his team are using Threat Stack. Al-Aziz also details in the case study the company-wide benefits they are realizing, including a shortened sales cycle, by having a continuous security monitoring solution in place. Below is their story.
Whether you’re a current Threat Stack customer or not, there is a lot you’ll be interested to learn in regards to proactively protecting your company’s cloud-resident data with Threat Stack. It is our single most important mission to help you answer the questions that matter most in regards to cloud security. That’s why we’ve developed an exclusive product webinar on March 24th where we’ll let you take the reins. We will be providing a lot of information that you may not yet know about Threat Stack’s capabilities, but a majority of the time will be spent answering your most pressing questions which you can submit to us prior to the webinar. We will take care to answer every question we can to elevate your knowledge about continuous cloud security and Threat Stack.
Join Threat Stack’s Director of Ops & Support, Pete Cheslock, as he discusses the security needs of modern, DevOps-managed infrastructures with Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group, in next week’s GigaOM webinar.
With the lack of sophisticated security features in public cloud infrastructure environments like AWS, it’s critical for DevOps teams to implement audit trails in order to adhere to compliance and regulation mandates. Continuous security monitoring is the answer and on February 11th, Pete, Greg and Matt will be discussing the importance of having this new level of visibility into an entire EC2 attack surface.
Yesterday, our Co-Founder and Chief Scientist, Jen Andre, and CEO, Doug Cahill, hosted a live webinar, “Preparing for the Next Shellshock.” Shellshock is the most notable and destructive vulnerability to date, and alongside POODLE and Heartbleed, 2014 has now been deemed the year with the most reported vulnerabilities in history.
Last week, our Co-Founder and Chief Scientist, Jen Andre, spoke at Xconomy’s Tech Agenda 2015 in the panel “Hackers and Snoops, From the Cloud to the Cash Register”, alongside Lysa Myers, Security Researcher for ESET and moderator Sara Sorcher, Deputy Cybersecurity Editor for Passcode.
On September 24, 2014, a bug in the Unix Bash shell known as Shellshock was disclosed. The vulnerability widely affected Linux distributions, was easy to exploit, and allowed an attacker to gain unauthorized access to a computer system. This net shattering event left many organizations wondering whether they were compromised and if so, the extent of the damage.
That’s why on Wednesday, December 10th at 1:30pm EST, our Co-Founder and Chief Scientist, Jen Andre, and CEO, Doug Cahill, will be discussing lessons learned from this vulnerability and what companies can do to stay protected from the next one.
During this webinar you will learn how to:
- Uncover new threats
Using behavioral-based intrusion detection to protect against zero day attacks.
- Protect your customer data
Using continuous security monitoring and auditing to keep data secure.
- Reduce your EC2 workload attack surface
Gaining visibility and understanding your security coverage in AWS.
Join us for this live, interactive discussion and you will also receive a Threat Stack t-shirt. The webinar is already filling up fast — save your seat today for “Preparing for the Next Shellshock”.