Venkat Pothamsetty's Latest Blogs

21 total posts.

4 Min Read
Shifting to High-Velocity Cloud Security Operations

Venkat Pothamsetty

September 15, 2017

How to compress Mean Time To Resolution (MTTR) and drive operational efficiency Slashing MTTR is one way of shifting into a high-velocity security ...

2 Min Read
New Threat Stack Feature: S3 File Integrity Monitoring

Venkat Pothamsetty

January 17, 2017

Threat Stack customers receive a great deal of value from our Linux File Integrity Monitoring (FIM), and we have now extended that capability to ...

4 Min Read
How to Optimize Your Incident Response Process in the Cloud

Venkat Pothamsetty

December 23, 2016

Bad guys know the faster they move, the more they’ll be able to accomplish: the more data they’ll be able to steal, the more money they’ll be ...

4 Min Read
How to Monitor Outbound and Inbound Connections to Maintain Cloud Security

Venkat Pothamsetty

December 21, 2016

When it comes to staying secure in the cloud, an important practice is to monitor both incoming and outgoing connections from your network. Why? ...

< 1 Min Read
The Cloud Security Use Cases Playbook

Venkat Pothamsetty

December 15, 2016

Over the last year, we have published a number of playbooks that, together, deliver strategic and tactical information to guide you from high-level ...

5 Min Read
A Blueprint for Selecting Security Technologies Inside the Cloud

Venkat Pothamsetty

September 1, 2016

Cloud security operations teams, especially ones that are looking at security technologies for the first time, are often faced with a daunting list ...

2 Min Read
Using AWS Tags With Threat Stack Security Alerts

Venkat Pothamsetty

June 3, 2016

Since first releasing Threat Stack Cloud Security Platform®, we continue to make enhancements that provide better data, increase ...

3 Min Read
How to Create an Effective Cloud Security Alerting Process

Venkat Pothamsetty

May 26, 2016

The first component of any security program should be an alert system. Alerts are typically the fastest and most effective way to be notified when ...

4 Min Read
Your Cloud Security Goals: Where to Start?

Venkat Pothamsetty

May 18, 2016

We’re willing to assume that cloud security is important to your company, but proactively building and implementing a strategy to make it happen is ...

5 Min Read
Who is That EC2 User?

Venkat Pothamsetty

May 17, 2016

Identity management is a difficult problem in the cloud, especially when it comes to sharing user accounts — an all too familiar (and problematic) ...

5 Min Read
How to Get Buy-In for Your Cloud Security Strategy

Venkat Pothamsetty

May 6, 2016

“All men can see these tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved.” – Sun Tzu Ah, team ...

5 Min Read
How to Use SOSTAC® to Build Your Security Strategy

Venkat Pothamsetty

April 26, 2016

Some people go to great lengths to find things to disagree about, but I think there’s one thing all of us can agree on: cloud security keeps us on ...

< 1 Min Read
New Webhook API — Unleashing the Power of Real-Time Security Alerts

Venkat Pothamsetty

April 14, 2016

With today’s announcement, Threat Stack continues its commitment to driving increasingly efficient security workflows. The addition of a new ...

7 Min Read
Contextual Data: Answering Who, What, Where, When

Venkat Pothamsetty

March 11, 2016

What if one day you came home and a bunch of your valuables had been stolen: computers, jewelry, that big screen TV. When you call the police to ...

4 Min Read
Threat Stack Alerts Now Available in Slack

Venkat Pothamsetty

March 9, 2016

When it comes to leveraging modern infrastructure to run fast in the cloud, there simply isn’t room for inefficient processes and siloed workflows. ...

3 Min Read
Threat Stack February Recap

Venkat Pothamsetty

March 8, 2016

February is the month of love, and we may be biased, but we’re head over heels for the new and improved Threat Stack! If you’ve been keeping up ...

3 Min Read
How to Integrate Threat Intelligence With Your Cloud Security Operations

Venkat Pothamsetty

February 25, 2016

What roadblocks will attackers come across when attempting to penetrate your workload? If you’re drawing a blank, chances are your attackers will ...

5 Min Read
Introducing Vulnerability Management at the Workload Layer

Venkat Pothamsetty

February 23, 2016

You know that feeling you sometimes get after you’ve left the house for the day and suddenly fear you didn’t lock the door? You have two options: ...

2 Min Read
How to Pick a Cloud Security Technology that Works for Everyone at Your Organization

Venkat Pothamsetty

February 11, 2016

Does the ownership of security within your organization look like a disorganized football scrimmage with no clear offense or defense? This is ...

4 Min Read
Are Any of These 6 Roadblocks Standing in the Way of Your Cloud Security?

Venkat Pothamsetty

February 4, 2016

Sometimes it feels like achieving security in the cloud comes with more roadblocks than a presidential motorcade on Election Day. As the platforms, ...

2 Min Read
Threat Stack & Amazon Inspector: A Layered Approach for Strong Security in the Cloud

Venkat Pothamsetty

October 21, 2015

Threat Stack’s involvement at this year’s AWS re:Invent was a roaring success. The team returned to the scene where we launched out of beta just ...