5 Min Read November 19, 2019

8 Best Practices for Strengthening Security in Cloud-Native Environments

Cloud-native companies and larger companies migrating to cloud environments continue to see the cloud as a way to gain speed, reliability, and other well-known benefits. But there are still plenty of pitfalls that can undermine security and negatively impact operations. To help remedy this situation, this post outlines some of the mistakes that operators make […]

4 Min Read October 1, 2019

The Top 3 Security Mistakes SaaS Companies are Making

The more data you store, the more attractive you become to cybercriminals, so SaaS companies need to recognize the importance of following security best practices. However, even those who understand this imperative can find it difficult to know where to start. With that in mind, this post discusses three of the most common security mistakes […]

4 Min Read June 4, 2019

AWS GDPR: What You Need to Know

In May 2018, the General Data Protection Regulation became enforceable. While it is largely a European Union regulation, you are still covered by it if you store or process personal information of EU citizens. If you use Amazon Web Services, you already know about many of the common security issues that can arise if you’re […]

3 Min Read January 30, 2019

Leveraging Threat Stack’s Out-of-the-Box Rulesets and Single View for Managing Multiple AWS Accounts

Increasingly, AWS users are leveraging multiple accounts to manage their infrastructure. While doing so is a recommended best practice that enables users to achieve the highest levels of resource and security isolation and to optimize operational costs, it can also increase the amount of time and effort required for effective administration and remediation. As a […]

5 Min Read December 14, 2018

What is Cloud Workload Security?

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a container, among other things. Broadly speaking, therefore, cloud workload security is any means of protecting these workloads. There is a common misconception that securing your […]

3 Min Read August 14, 2018

How to Find and Remediate Open Infrastructure Ports

The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave your organization at risk for security breaches. For example, in July 2018, an open S3 bucket at a political autodial company, Robocent, exposed nearly 2,600 files relating to political campaigns. […]