Tim Armstrong's Latest Blogs

21 total posts.

4 Min Read
Don’t Make Perfect Security the Enemy of Good Security

Tim Armstrong

February 24, 2017

We’ve written before about what it means to meet compliance standards without going completely overboard. Today, we want to talk about how that ...

3 Min Read
How to Use Ops Tools for Security and Security Tools for Ops

Tim Armstrong

February 17, 2017

Investing in SecOps doesn’t just mean hiring folks who know how to blend together software development, IT operations, and security skillsets. It ...

3 Min Read
Three Good Reasons to Get Compliant Now

Tim Armstrong

February 1, 2017

When things are hectic at your organization, compliance may not feel like the highest priority. If you aren’t in an industry that absolutely ...

4 Min Read
How to Choose the Right Tools for Incident Management and Reporting

Tim Armstrong

January 31, 2017

Your incident management process is greatly impacted by the tools you have available to carry it out. Technology should be your friend when it comes ...

4 Min Read
How to Use Automation to Improve Your Cloud Security Posture

Tim Armstrong

January 27, 2017

Automating security processes and workflows can help teams lower Mean Time To Resolution (MTTR), maintain or strengthen an organization’s security ...

5 Min Read
How to Secure Your Cloud Environment for What’s Next

Tim Armstrong

January 24, 2017

In Part 1 of this two-part series, we put a magnifying glass on some of the top cloud security trends and lessons learned in 2016. In Part 2, we’re ...

4 Min Read
To Build or Buy Your Own Security Platform: That is the Question

Tim Armstrong

January 23, 2017

What’s your priority: to become a Security Company or be a Secure Company? If you’re truly in the security business, then of course you’ll be ...

4 Min Read
To Predict Cloud Security’s Future, We Must First Understand Its Past

Tim Armstrong

January 19, 2017

The conversations about cloud security are changing rapidly. A few years ago, companies were hesitant to even talk about moving to the cloud because ...

2 Min Read
Why You Can’t Wait Until a Security Person is Hired

Tim Armstrong

January 11, 2017

Organizations wait to implement security solutions for a variety of reasons. One that we often hear is that they’re looking to land that cloud ...

4 Min Read
3 Ways Businesses Can Address IoT Security Failures

Tim Armstrong

January 5, 2017

I watched a Twilight Zone marathon over the New Year’s weekend, and it got me wondering about today’s Internet of Things (IoT). Are “Things” ...

5 Min Read
Your Year-End Cloud Security Health Check: Reflections and Resolutions

Tim Armstrong

December 29, 2016

It’s the end of the year — a classic time for reflection. So before we charge into 2017, let’s ask: What went well in the world of ...

5 Min Read
According to Our Readers: Threat Stack’s Top 10 Blog Posts for 2016 (and More)

Tim Armstrong

December 28, 2016

One of our goals at Threat Stack is sharing information that will help you learn about the current cloud security threat landscape in order to ...

4 Min Read
Vulnerabilities and Exploits: What You Need to Know

Tim Armstrong

December 12, 2016

Exploits feed on vulnerabilities. Vulnerabilities, in turn, pave the way for exploits. These closely related security concepts are often confused, ...

4 Min Read
Where to Find Security Talent & How to Keep Them Happy

Tim Armstrong

December 7, 2016

It’s no secret that there’s a huge talent shortage in the security space today. With a low supply and high demand, salaries have surged, ...

3 Min Read
The Realities of Hybrid Computing Today & How to Stay Secure

Tim Armstrong

November 30, 2016

As we hurtle into the future, it often seems that talk in the tech media revolves around cloud computing. But the reality for many companies, ...

4 Min Read
Best Practices for Implementing & Scaling Security in AWS

Tim Armstrong

November 18, 2016

Security is a shared responsibility when you run your business on Amazon Web Services (AWS). To hold up your end of the bargain, there are many best ...

4 Min Read
4 Steps to Building a Security Awareness Program

Tim Armstrong

November 18, 2016

At Threat Stack, we develop security software, so it’s important to us that people have the technology they need to manage security issues in ...

5 Min Read
Vulnerability Management: Navigating the Deep Dark Pit of Version Numbers

Tim Armstrong

November 8, 2016

One of the first things any security practitioner will tell you to do is keep your software up to date. It’s the number one way to protect against ...

4 Min Read
IoT Botnets and DDoS: A New Reality With New Responsibilities

Tim Armstrong

October 26, 2016

Last Friday, multiple massive distributed denial ofservice (DDoS) attacks hit Dyn, an internet performance management company headquartered in New ...

5 Min Read
Anatomy of an Attack: How the Cloud Gets Hacked

Tim Armstrong

October 24, 2016

The cloud is very different from on-premise infrastructure in several key ways. Some of these differences become apparent when it comes to external ...

3 Min Read
A Look Back at AppSecUSA: From Application Security to DevOps and Beyond

Tim Armstrong

October 18, 2016

Last week I spent two fantastic days in Washington, DC attending the AppSecUSA Conference on behalf of Threat Stack, one of the event’s Silver ...