Sam Bisbee's Latest Blogs

10 total posts.

4 Min Read
The How vs the Who: An Argument Against Attribution & Hack Back

Sam Bisbee

November 2, 2016

A lot of organizations focus their efforts on identifying external actors, distinguishing between different groups that may be attempting malicious ...

5 Min Read
Creating a Framework to Enable Compliance in the Cloud

Sam Bisbee

May 13, 2016

How many times have you finished a 1,000-piece puzzle? How about a serious game of Monopoly? Both of these activities have parallels with the process ...

6 Min Read
It All Started With a Wager About System Upgrades

Sam Bisbee

March 24, 2016

It all started with a wager of the usual amount over beers with @brianhatfield. When running workloads in Cloud environments, do organizations ...

2 Min Read
Who Became Root?

Sam Bisbee

February 4, 2016

This week you may have noticed the introduction of a new feature - the sudoer field. ...

11 Min Read
Scale it to Billions — What They Don’t Tell you in the Cassandra README

Sam Bisbee

September 22, 2015

At Threat Stack our engineering and operations teams have embraced the concept of the polyglot data platform, recognizing that no one solution can ...

4 Min Read
How to Manage the Ex-Employee Insider Threat

Sam Bisbee

August 6, 2015

A developer or operator leaving your company is always a harrowing event. More than likely they had access to your production environment, so you ...

5 Min Read
Reinforcing Your Hardened Server’s Soft Spots

Sam Bisbee

June 30, 2015

If you have either deployed or are planning to deploy a workload to the Cloud, perhaps using AWS, you are looking to run your operations efficiently ...

3 Min Read
What All DevOps Teams Should Know About The AWS Shared Responsibility Model

Sam Bisbee

June 10, 2015

Keeping your cloud workloads secure, compliant, and protected while moving at the speed of DevOps is no easy task. Our team at Threat Stack knows ...

5 Min Read
3 Reasons Why the Host Rules Cloud IDS

Sam Bisbee

February 5, 2015

To truly appreciate why companies like Threat Stack point to the Cloud as a watershed event in their corner of the software industry, one must push ...

3 Min Read
Who Gets Access to Production?

Sam Bisbee

July 23, 2014

This is the third installment in our new series of weekly blog posts that dives into the role of SecDevOps. This series looks into why we need it in ...