Travis Wilkins's Latest Blogs

16 total posts.

3 Min Read
The Hidden Dangers of Shadow IT to Cloud Security

Travis Wilkins

December 5, 2017

Shadow IT has emerged in recent years due to misaligned objectives among teams and the fluid nature of DevOps. We’ve written before that although ...

2 Min Read
New eBook: Myth Busting Intrusion Detection

Travis Wilkins

November 14, 2017

Your Guide to Intrusion Detection for Modern Infrastructure Many organizations that need cloud security are laboring behind a cloud of myths — ...

3 Min Read
What’s Driving Cloud Security Investment Today? Learnings From Our Survey

Travis Wilkins

October 27, 2017

Public cloud investment is expanding rapidly in 2017, with Gartner projecting 18% growth over the course of this year, including 36.8% growth for the ...

3 Min Read
The State of Container Security: What We Learned From Our Survey

Travis Wilkins

October 25, 2017

Containers are a big topic of conversation right now — and for good reason. They represent a powerful and transformative shift toward ...

6 Min Read
11 Questions to Ask Before Investing in a Cloud Security Solution

Travis Wilkins

October 11, 2017

Whether you’re in security, operations, or another related discipline, choosing the right cloud security products can be a complex process. With ...

4 Min Read
7 Ways Business Processes Have Changed the Need for Security

Travis Wilkins

October 5, 2017

Considering how fast every facet of business is changing today, the job for Security teams has become much more complex — and critical. Not only ...

5 Min Read
Threat Stack Included in Gartner Market Guide for Cloud Workload Protection Platforms Report

Travis Wilkins

September 27, 2017

We believe Threat Stack’s cloud security approach is validated by inclusion in Gartner’s “Market Guide for Cloud Workload Protection ...

3 Min Read
New eBook: Cloud Infrastructure Security Buyer’s Guide

Travis Wilkins

September 25, 2017

Your Reference for Selecting a Cloud Security Platform To help you through the process of matching your organization’s requirements with available ...

4 Min Read
What is Continuous Cloud Compliance & How Can I Achieve It?

Travis Wilkins

September 18, 2017

Cloud compliance, like cloud security, is never a one-and-done activity. To be compliant, you need to demonstrate it continuously. Systems must be ...

6 Min Read
5 Cloud Security Tips for Emerging Tech Companies

Travis Wilkins

August 21, 2017

True or false: Companies born in the cloud naturally understand security. Young and tech-savvy companies running in the cloud often deal with the ...

4 Min Read
Prevention Isn't Enough. Why All Companies Need Detection Too

Travis Wilkins

August 15, 2017

How would you know if your prevention methods failed to catch a critical threat? One of two ways: Either a customer, an auditor, or another third ...

5 Min Read
Not Ready for Cloud Security? Here Are 5 Things You Can Do in the Meantime

Travis Wilkins

July 25, 2017

If you are currently running an on-premise or hybrid environment with an eye to eventually making a complete transition to the cloud, you may be ...

5 Min Read
5 Considerations for Evaluating a Cloud Security Solution

Travis Wilkins

July 7, 2017

Many companies today are turning to cloud security solutions — from security monitoring platforms to orchestration tools to alerting systems — in ...

3 Min Read
3 Key Points on How Vulnerability Management Can Help You Become Compliant

Travis Wilkins

June 23, 2017

Two interesting observations: The average number of days that attackers were present on a victim’s network before being discovered is 146 days. ...

6 Min Read
Risk Acceptance & Business Payout

Travis Wilkins

June 15, 2017

Key Takeaways From the Gartner Security & Risk Management Summit 2017 I just got back from the Gartner Security & Risk Management Summit with ...

5 Min Read
How to Prioritize Security Tasks When You Have Limited Resources

Travis Wilkins

June 7, 2017

Many organizations have limited resources (time, personnel, and money) for IT, and oftentimes only a small portion of that is devoted to security. ...