Latest Blogs About "Cloud Security"

195 total posts.

5 Min Read
What is Cloud Workload Security?

Stephen Fitzgerald

December 14, 2018

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...

2 Min Read
Three Old-School Network Security Tips That (Still!) Work for Modern Infrastructure

Nathan Cooprider

November 20, 2018

The adage “Everything old is new again,” rings true in the cybersecurity industry as much as anywhere else. Some of the best practices from ...

4 Min Read
AWS EC2 Tagging — An Overview

Pan Chhum

November 1, 2018

Just this morning I received my weekly AWS announcements email, and as I usually do, took a peek to see if there was anything useful or interesting. ...

3 Min Read
How to Create a Threat Model for Cloud Infrastructure Security

Pat Cable

October 30, 2018

Our Motto is: Threat Modeling: The sooner the better, but never too late. — OWASP The practice of creating a threat model can help teams ...

7 Min Read
A Deep Dive Into Secrets Management

Mike Broberg

October 9, 2018

There’s a lot to think about when it comes to working with containers, Kubernetes, and secrets. You have to employ and communicate best practices ...

15 Min Read
22 Most Under-Used AWS Security Metrics

Hank Schless

September 21, 2018

22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics AWS offers a variety of built-in security features that users ...

21 Min Read
50 Best Cloud Security Podcasts

Mark Moore

September 17, 2018

For an updated list, take a look at Mark Moore's 25 Best Cloud Security Podcasts to Visit in 2020. Some of the earliest podcasters were ...

2 Min Read
Security by Design or by Accident

Matt Getty

September 11, 2018

Security has such a large number of subtopics that it’s sometimes difficult to define what the field looks like as a whole. It means something ...

3 Min Read
How to Find and Remediate Open Infrastructure Ports

Stephen Fitzgerald

August 14, 2018

The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave ...

4 Min Read
Best Practices for User Access Management

Christian Lappin

August 9, 2018

Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In ...

13 Min Read
What Would You Change About AWS Security?

Pete Cheslock

August 8, 2018

20 Security Pros Reveal the One Thing They'd Change About AWS Security AWS is one of the most popular cloud platforms among enterprises and even ...

3 Min Read
How to Avoid Targeted AWS Attacks With Secure AWS Keys

Pat Cable

July 25, 2018

If the headlines are any indication, hackers continue to exploit vulnerabilities in cloud infrastructure platforms, with targeted AWS attacks ...

10 Min Read
101 AWS Security Tips & Quotes, Part 4: Best AWS Security Practices

Bob Allin

July 11, 2018

The fourth — and final — blog post in our series of AWS Security Tips and Quotes offers tips on AWS Security Best Practices. So far the series ...

3 Min Read
Access Management Lessons From Timehop’s Cloud Security Breach

Pat Cable

July 10, 2018

Over the past couple of weeks, both Macy's and Timehop experienced breaches as a result of authentication weaknesses. On July 4, social media startup ...

10 Min Read
101 AWS Security Tips & Quotes, Part 3: Best Practices for Using Security Groups in AWS

Bob Allin

July 3, 2018

Here’s the third blog post in our 4-part series of AWS Security Tips and Quotes, which is designed to help you evolve and strengthen your ...

11 Min Read
101 AWS Security Tips & Quotes, Part 2: Securing Your AWS Environment

Hank Schless

June 26, 2018

As part of its mission, Threat Stack has always brought its readers security-related content to help them make informed decisions that will ...

12 Min Read
101 AWS Security Tips & Quotes, Part 1: Essential Security Practices

Hannah Klemme

June 21, 2018

With more companies than ever leveraging cloud services like AWS, and with cloud environments becoming more and more complex, it’s imperative that ...

3 Min Read
Why an Infrastructure Transition is the Perfect Time to Invest in Security

Todd Morneau

June 20, 2018

You’re in the midst of an infrastructure transition, and you have a million and one things on your plate. Whether you are deploying containers for ...

4 Min Read
5 Statistics That Prove Why Your Security Posture Can’t Be Purely Reactive

Hank Schless

June 19, 2018

While reacting to alerts and incidents after they occur will always be a reality of the security professional’s job, a purely reactive security ...

3 Min Read
How to Develop An Incident Response Checklist for Your SaaS Business

Christian Lappin

June 8, 2018

Earlier this week, we published a post that explains how to develop an Incident Response Plan (IRP) to prepare for when an incident inevitably ...

6 Min Read
How to Develop an Incident Response Plan for Your SaaS Business

Christian Lappin

June 5, 2018

According to a 2018 IBM study on cybersecurity resilience, 77 percent of firms surveyed lack proper incident response plans, while 69 percent report ...