How Does Compliance Differ In The Cloud Versus On-Premise?

With 253 healthcare breaches in 2015 for a total of 112 million lost records, HIPAA compliance has never been more relevant. Meanwhile, 80 percent of businesses fail their PCI compliance assessments.

As a business, whether you’re storing patient records or processing customer credit card data, chances are the government or your customers (or, many times, both) require you to meet some sort of compliance standards. And it ain’t easy.

Read more “How Does Compliance Differ In The Cloud Versus On-Premise?”

How Compliance in the Cloud Can Strengthen Your Business

Often companies think of compliance as an annoying imposition — something to grin and bear. And while achieving compliance is not always a cakewalk, the upside of doing so can be huge. Whether you are interested in starting a company, entering a new market, or winning  new customers, achieving compliance can be a major business driver. Here’s why it’s beneficial to your bottom line to think about compliance in this way.

Read more “How Compliance in the Cloud Can Strengthen Your Business”

The Top 5 Things Companies Handling PHI Need to Know About Cloud Security

An increasing number of healthcare organizations are transitioning from data centers to cloud computing today. Healthcare CIOs are, like those in many other industries, turning to the cloud to realize benefits that include efficiency, flexibility, and cost savings. Some experts argue that this increased use of the cloud opens them up to more security challenges, but in fact the cloud isn’t necessarily any less secure than traditional computing — and in many cases, it is more secure. It’s a matter of using it intelligently and building a complete and appropriate security strategy.

Read more “The Top 5 Things Companies Handling PHI Need to Know About Cloud Security”

Announcing Threat Stack’s Compliance Blog Post Series

PCI DSS. HIPAA. SOC 2. SOX 404. Compliance can be a complicated and confusing beast, with plenty of acronyms and layers of regulations — not to mention expenses and stress. But achieving compliance in the cloud can also be the key to unlocking new sources of revenue, winning business, and achieving success in today’s competitive business environment.

Read more “Announcing Threat Stack’s Compliance Blog Post Series”

4 Things You Need to Know About SOC 2 Compliance

Compliance isn’t as simple as a connect-the-dots exercise. When you consider how fast companies are moving to and expanding on the cloud, alongside the proliferation of cloud-based security threats, compliance can be a little dizzying. We’re here to break the complexities of compliance requirements down for you, starting with SOC 2.

SOC 2 is one of the more common compliance requirements technology companies must meet today.

So what does SOC 2 compliance mean and how can you go about achieving it? In this post, we will break down the four most important things you need to know. Read more “4 Things You Need to Know About SOC 2 Compliance”

Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take

In today’s volatile threat environment, it has become a board-level necessity to find ways to minimize the exposure, liability and risk to personal health information (PHI). One of the best ways to do this is to ensure you are meeting all relevant compliance obligations and requirements. However, most companies simply tick the checkboxes and move on, putting security aside until the next big audit or threat comes along. With today’s threat landscape evolving as you read these very words, this is no longer enough.

Read more “Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take”

6sense Case Study: Protecting Customer Data & Meeting SOC 2 Compliance

We recently spoke with Threat Stack customer Jameel Al-Aziz, DevOps/Software Engineer for 6sense, and developed the following case study that showcases how Al-Aziz and his team are using Threat Stack. Al-Aziz also details in the case study the company-wide benefits they are realizing, including a shortened sales cycle, by having a continuous security monitoring solution in place. Below is their story.

Read more “6sense Case Study: Protecting Customer Data & Meeting SOC 2 Compliance”