Announcing Threat Stack’s Compliance Blog Post Series

PCI DSS. HIPAA. SOC 2. SOX 404. Compliance can be a complicated and confusing beast, with plenty of acronyms and layers of regulations — not to mention expenses and stress. But achieving compliance in the cloud can also be the key to unlocking new sources of revenue, winning business, and achieving success in today’s competitive business environment.

Read more “Announcing Threat Stack’s Compliance Blog Post Series”

4 Things You Need to Know About SOC 2 Compliance

Compliance isn’t as simple as a connect-the-dots exercise. When you consider how fast companies are moving to and expanding on the cloud, alongside the proliferation of cloud-based security threats, compliance can be a little dizzying. We’re here to break the complexities of compliance requirements down for you, starting with SOC 2.

SOC 2 is one of the more common compliance requirements technology companies must meet today.

So what does SOC 2 compliance mean and how can you go about achieving it? In this post, we will break down the four most important things you need to know. Read more “4 Things You Need to Know About SOC 2 Compliance”

6sense Case Study: Protecting Customer Data & Meeting SOC 2 Compliance

We recently spoke with Threat Stack customer Jameel Al-Aziz, DevOps/Software Engineer for 6sense, and developed the following case study that showcases how Al-Aziz and his team are using Threat Stack. Al-Aziz also details in the case study the company-wide benefits they are realizing, including a shortened sales cycle, by having a continuous security monitoring solution in place. Below is their story.

Read more “6sense Case Study: Protecting Customer Data & Meeting SOC 2 Compliance”