Latest Blogs About "Cloud Security"

179 total posts.

6 Min Read
How to Understand Your Attacker’s Mindset

Aakash Prasad

March 7, 2019

In this post we’ll try to develop an understanding of a typical attacker’s mindset and then show you how companies like yours can use this ...

5 Min Read
Transforming Alert Fatigue Into Proactive Security Management

John Shoenberger

February 12, 2019

In a recent study, 72% of CISOs stated that their teams are facing alert fatigue, while 82% of respondents to a Threat Stack survey indicated that ...

3 Min Read
AWS Security Readiness Checklist

Mark Moore

January 16, 2019

This AWS Security Readiness Checklist is intended to help organizations evaluate their applications and systems before deployment on AWS. This ...

20 Min Read
The Best Cloud Security Conferences to Attend in 2019

Sarah Wills

January 4, 2019

For the latest info — take a look at Sarah Wills’ Best Cloud Security Conferences to Attend in 2020. Securing any cloud infrastructure is ...

5 Min Read
AWS Security Groups: What They Are and How to Get the Most Out of Them

John Shoenberger

December 19, 2018

AWS Security Groups are a flexible tool to help you secure your Amazon EC2 instances. AWS Security Groups are just one of several tools AWS offers to ...

5 Min Read
What is Cloud Workload Security?

Stephen Fitzgerald

December 14, 2018

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...

2 Min Read
Three Old-School Network Security Tips That (Still!) Work for Modern Infrastructure

Nathan Cooprider

November 20, 2018

The adage “Everything old is new again,” rings true in the cybersecurity industry as much as anywhere else. Some of the best practices from ...

4 Min Read
AWS EC2 Tagging — An Overview

Pan Chhum

November 1, 2018

Just this morning I received my weekly AWS announcements email, and as I usually do, took a peek to see if there was anything useful or interesting. ...

3 Min Read
How to Create a Threat Model for Cloud Infrastructure Security

Pat Cable

October 30, 2018

Our Motto is: Threat Modeling: The sooner the better, but never too late. — OWASP The practice of creating a threat model can help teams ...

7 Min Read
A Deep Dive Into Secrets Management

Mike Broberg

October 9, 2018

There’s a lot to think about when it comes to working with containers, Kubernetes, and secrets. You have to employ and communicate best practices ...

15 Min Read
22 Most Under-Used AWS Security Metrics

Hank Schless

September 21, 2018

22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics AWS offers a variety of built-in security features that users ...

21 Min Read
50 Best Cloud Security Podcasts

Mark Moore

September 17, 2018

For an updated list, take a look at Mark Moore's 25 Best Cloud Security Podcasts to Visit in 2020. Some of the earliest podcasters were ...

2 Min Read
Security by Design or by Accident

Matt Getty

September 11, 2018

Security has such a large number of subtopics that it’s sometimes difficult to define what the field looks like as a whole. It means something ...

3 Min Read
How to Find and Remediate Open Infrastructure Ports

Stephen Fitzgerald

August 14, 2018

The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave ...

4 Min Read
Best Practices for User Access Management

Christian Lappin

August 9, 2018

Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In ...

13 Min Read
What Would You Change About AWS Security?

Pete Cheslock

August 8, 2018

20 Security Pros Reveal the One Thing They'd Change About AWS Security AWS is one of the most popular cloud platforms among enterprises and even ...

3 Min Read
How to Avoid Targeted AWS Attacks With Secure AWS Keys

Pat Cable

July 25, 2018

If the headlines are any indication, hackers continue to exploit vulnerabilities in cloud infrastructure platforms, with targeted AWS attacks ...

10 Min Read
101 AWS Security Tips & Quotes, Part 4: Best AWS Security Practices

Bob Allin

July 11, 2018

The fourth — and final — blog post in our series of AWS Security Tips and Quotes offers tips on AWS Security Best Practices. So far the series ...

3 Min Read
Access Management Lessons From Timehop’s Cloud Security Breach

Pat Cable

July 10, 2018

Over the past couple of weeks, both Macy's and Timehop experienced breaches as a result of authentication weaknesses. On July 4, social media startup ...

10 Min Read
101 AWS Security Tips & Quotes, Part 3: Best Practices for Using Security Groups in AWS

Bob Allin

July 3, 2018

Here’s the third blog post in our 4-part series of AWS Security Tips and Quotes, which is designed to help you evolve and strengthen your ...

11 Min Read
101 AWS Security Tips & Quotes, Part 2: Securing Your AWS Environment

Hank Schless

June 26, 2018

As part of its mission, Threat Stack has always brought its readers security-related content to help them make informed decisions that will ...