Latest Blogs About "Cloud Security"

195 total posts.

7 Min Read
Scaling Anomaly Detection Pipelines For Security Telemetry

Mina Botros

April 15, 2021

This blog post is co-authored by Senior Software Engineer Mina Botros, Principal Data Scientist Dmitry Kit, and Senior Software Engineer, Platform ...

2 Min Read
Capture the Benefits of AWS Graviton2 Without Compromising Security

Harrison Calato

April 13, 2021

According to Gartner, worldwide end-user spending on public cloud services is forecast to grow 18.4% in 2021 to a total of $304.9 billion, up from ...

2 Min Read
Accelerating Mean-Time-To-Know With Security Analytics

Rob Young

March 25, 2021

There are few cybersecurity KPIs more important than mean-time-to-know (MTTK) and mean-time-to-respond (MTTR). Threat Stack provides alerts to ...

3 Min Read
Making debugging easier on Fargate

Sabin Thomas

March 16, 2021

What is Fargate? Fargate was launched by AWS in 2017.  It’s a serverless compute engine that deploys and runs containers without the need to ...

2 Min Read
Threat Stack named a 2021 Best IT Cloud Management Product by G2

Rob Young

February 23, 2021

Threat Stack is excited to share that it has been named a Best IT Cloud Management Product by  G2. G2 ranks the world's best software companies and ...

3 Min Read
Shrink Mean Time-To-Know With Real-Time AWS EC2 Metadata

Rob Young

February 2, 2021

When the cybersecurity team receives an indicator of a potential attack, every minute counts. The longer it takes to determine whether an alert is ...

7 Min Read
Why Alerts per Day is a Misleading Metric for Security Teams

Sam Bisbee

January 12, 2021

Over the last six and a half years we have worked with thousands of companies of all sizes and maturities on implementing threat detection for their ...

11 Min Read
Rationalizing Data Science, Machine Learning, and Change Management for Security Leadership

Sam Bisbee

January 11, 2021

At first glance data science and machine learning conflict with security best practices. Data science and engineering teams need access to ...

3 Min Read
Five Cloud Security Myths

Rob Young

January 7, 2021

The pandemic will have a lasting, long-term effect on IT, and one of the most important will be even faster migration to the cloud, according to ...

3 Min Read
An Open Letter to Security Vendors’ Predatory Use of Public Breaches

Sam Bisbee

December 11, 2020

Disclaimer: This post discusses a breach that is reportedly under active investigation. I have not spoken with the FireEye team about this incident, ...

4 Min Read
Establishing a 2021 Cloud Security Strategy

Rob Young

November 17, 2020

In early 2020, organizations were already moving quickly towards the cloud before the COVID-19 pandemic put their journey into fifth gear. How fast ...

3 Min Read
Overcoming the Cloud Security Skills Shortage by Encoding Expertise

Jackson Connell

October 15, 2020

In case you missed them, in recent blogs we did a deep dive into Threat Stack’s ability to provide extensive cloud security telemetry and hinted at ...

3 Min Read
Security Rules with Anomaly Detection: Capture the Known and the Unknown

John Pinkham

October 7, 2020

Any cybersecurity team that has had to respond to a compliance audit knows that it’s a lot easier to monitor for specific risks as they occur, ...

5 Min Read
Accelerate Security with Threat Stack Telemetry

Mike Broberg

September 23, 2020

There’s a lot of value in Threat Stack’s deep, continuous telemetry. By casting a wide net, our customers get the complete story about what’s ...

15 Min Read
50 Best AWS CloudWatch Tutorials

Jackson Connell

September 10, 2020

AWS is one of the largest and most popular cloud computing platforms. Amazon first began offering IT infrastructure services to businesses back in ...

6 Min Read
40 Essential Cloud Security Blogs for IT Professionals

Jackson Connell

July 9, 2020

As the rapid adoption of new ephemeral cloud deployment options, like containers and kubernetes, gives DevOps teams more flexibility, it is more ...

7 Min Read
System Access and User Accountability in the Cloud

Mike Broberg

June 18, 2020

Evaluating Your Security Mechanisms Throughout the IT industry, security mechanisms are used to allow or deny access to objects, such as a file, by ...

3 Min Read
Ping Identity Achieves Cloud Security Observability in Rapidly Scaling Environment

Robin Stone

March 19, 2020

Recently I had an opportunity to speak with Ryan Ivis, Manager of Security Architecture at Ping Identity. Over the course of our discussion, Ryan ...

6 Min Read
4 Cloud Security Tips for Emerging Tech Companies

Mark Moore

March 3, 2020

Young tech companies running in the cloud often deal with the same cloud security issues as larger organizations that are moving to the cloud from ...

6 Min Read
Optimizing Detection of Breached Passwords

Mark Moore

February 13, 2020

In the increasingly difficult times of protecting our own digital life or helping others protect theirs, we must be ever vigilant about ensuring that ...

3 Min Read
Cloud Native Security Requires a 3D Mindset

Rebecca Meyrick

January 23, 2020

We’re in the midst of an ideological shift. As companies continue to move towards cloud-native software development and complex cloud ...