Pete Cheslock's Latest Blogs

29 total posts.

13 Min Read
What Would You Change About AWS Security?

Pete Cheslock

August 8, 2018

20 Security Pros Reveal the One Thing They'd Change About AWS Security AWS is one of the most popular cloud platforms among enterprises and even ...

14 Min Read
24 DevOps Pros Reveal the Most Important Characteristic of a Successful DevOps Engineer

Pete Cheslock

May 24, 2018

There’s no precisely defined career track for DevOps engineers because they’re typically developers or sysadmins who develop an interest in other ...

13 Min Read
20 Dev Leaders and Hiring Managers Reveal Their Favorite DevOps Interview Questions

Pete Cheslock

May 10, 2018

We champion a security-first DevOps culture at Threat Stack, and I’ve had the opportunity of building DevOps best practices into the company since ...

3 Min Read
3 Security Best Practices We Used to Build a Strong Foundation at Threat Stack

Pete Cheslock

April 26, 2018

As a security company, Threat Stack prioritized the implementation of security best practices from day one. To share our experience, this post ...

5 Min Read
How Threat Stack Does DevOps (Part IV): Making Engineers Accountable

Pete Cheslock

March 21, 2018

Early on at Threat Stack, we focused on giving engineers the tools and ownership over their applications that would empower them to deploy and manage ...

4 Min Read
How Threat Stack Does DevOps (Part III): Measuring and Optimizing System Health

Pete Cheslock

March 19, 2018

One of the most important things that any company can do to benefit from DevOps is define and implement useful, actionable metrics for visibility ...

4 Min Read
How Threat Stack Does DevOps (Part II): Engineering for Rapid Change

Pete Cheslock

March 16, 2018

Many organizations struggle with how and when to deploy software. I’ve worked at some companies where we had a “deploy week.” This was at least ...

4 Min Read
How Threat Stack Does DevOps (Part I): Best Practices in the Wild

Pete Cheslock

March 14, 2018

As Senior Director of Operations at Threat Stack, I am repeatedly asked one question by our customers: “How does Threat Stack 'do’ DevOps?” One ...

4 Min Read
Monitorama 2017: The Monitoring Revolution Continues

Pete Cheslock

May 31, 2017

Once again, Monitorama 2017 — the sixth official Monitorama — was held in Portland, OR. The event began at 10 a.m. on Monday, May 22 with a talk ...

5 Min Read
The Real Implications of The Shared Security Model

Pete Cheslock

May 8, 2017

Gone are the days when the majority of businesses could point to the cloud warily and say, “I think my data’s safer on-prem.” Organizations ...

3 Min Read
How to Stay Secure on Slack

Pete Cheslock

February 27, 2017

If you’re already on the Slack bandwagon, then you have probably experienced first-hand how it can make communications between teams far simpler ...

4 Min Read
How to Conduct a Blameless Security Post-Mortem

Pete Cheslock

November 11, 2016

When someone in your company clicks on a bad link, it can spell bad news. But you know what’s worse? Them never telling you. When employees are ...

3 Min Read
3 Things You Can Do to Improve Your AWS Security Posture

Pete Cheslock

November 10, 2016

There’s no question that Amazon Web Services is an incredibly powerful and secure cloud services platform for delivering all sorts of software ...

5 Min Read
The 5 Ingredients of a Successful SecOps Implementation

Pete Cheslock

November 3, 2016

Ask three people what SecOps is and chances are you’ll get three different descriptions: It’s a team It’s a job title It’s a ...

5 Min Read
Will SecOps Finally Close the Security and Operations Gap? A Q&A with Pete Cheslock

Pete Cheslock

October 27, 2016

At Threat Stack, we’ve been a SecOps-oriented team from day one. This means our developers, operations, and security practitioners all work ...

3 Min Read
Cloud Security: Where to Get Started, Part 2

Pete Cheslock

October 17, 2016

Last week, we released Part 1 of a two-part series on the low-hanging security best practices companies can implement to improve their security ...

4 Min Read
Cloud Security: Where to Get Started, Part 1

Pete Cheslock

October 13, 2016

If you look at how and when different companies implement security, it’s clear the approach runs the gamut. Some go all in from day one while many ...

4 Min Read
How to Monitor Network Activity When Your Infrastructure Lacks an Edge

Pete Cheslock

September 29, 2016

It won’t be long before network perimeters are a thing of the past. As companies continue to adopt the cloud, either going all-in or operating in ...

4 Min Read
How to Create a Security-Minded DevOps Organization: Three Best Practices

Pete Cheslock

September 22, 2016

You’re a week into your new job and a colleague shouts out across the room before a big deployment: “Hey John, you’ve got security covered, ...

4 Min Read
Why All Employees Should Be Security Ambassadors — and How to Do It

Pete Cheslock

September 15, 2016

A recent Motherboard article caught our eye and got us thinking about who is — and who should be — responsible for security in an organization. ...

4 Min Read
5 Tips for Reinforcing Your Organization's Cloud Security

Pete Cheslock

July 8, 2016

It’s every executive’s worst nightmare: becoming the next Target- or Anthem-style data breach headline. But aside from just hoping and praying ...