Latest Blogs About "Cloud Security"

174 total posts.

4 Min Read
A Straightforward Workflow to Define Your Cloud Security Strategy

Michal Ferguson

October 19, 2017

Security is a big concern for organizations of pretty much every size and shape. Once you have organization-wide agreement that security is a ...

6 Min Read
11 Questions to Ask Before Investing in a Cloud Security Solution

Travis Wilkins

October 11, 2017

Whether you’re in security, operations, or another related discipline, choosing the right cloud security products can be a complex process. With ...

4 Min Read
6 Ways to Adopt a Cloud-Specific Security Paradigm

Natalie Walsh

October 6, 2017

Cloud technologies and traditional security processes are as bad a match as stripes and polka dots. They simply aren’t built to mix well together. ...

5 Min Read
What You Need to Know About the Apache Struts Vulnerability – Updated

Anthony Alves

September 26, 2017

Post updated by: Christian Lappin, Threat Stack Senior Security Engineer & David Weinstein, Threat Stack Senior Security Engineer Four ...

4 Min Read
12 Low-Cost Cloud Security Practices With Big Payoffs

Chris Gervais

September 12, 2017

Good security takes effort. But it’s not impossible — far from it. The key to achieving better security is to focus on embedding the right types ...

7 Min Read
7 Factors to Help You Choose the Right Cloud Service Provider

Jim McDonough

August 31, 2017

The absence of a common framework for assessing Cloud Service Providers (CSPs), combined with the fact that no two CSPs are the same, complicates the ...

5 Min Read
When It’s Time To Put An Engine In Your Cloud Security Lifeboat

Christian Lappin

August 28, 2017

Oftentimes companies wait until they grow to a certain size or have a full technology stack before they begin thinking seriously about security. The ...

5 Min Read
How to Adapt Your Risk Management Strategy for the Cloud

Christian Lappin

August 23, 2017

Security has always been about accepting and managing risk. It’s not about becoming the most secure company; its goal is to protect against likely ...

4 Min Read
Prevention Isn’t Enough. Why All Companies Need Detection Too

Travis Wilkins

August 15, 2017

How would you know if your prevention methods failed to catch a critical threat? One of two ways: Either a customer, an auditor, or another third ...

5 Min Read
How to Cut Time-to-Security-Incident-Detection on AWS

Michal Ferguson

August 7, 2017

Time-to-detection is everything these days. If you don’t find a breach yourself, chances are someone else will. A recent study points out that up ...

4 Min Read
Whose Fault is That? How NOT to Be a Cloud Security Statistic

Natalie Walsh

August 2, 2017

Gartner predicts that 95% of cloud security failures from now until 2020 will be the customer’s fault. That means when something goes wrong, it’s ...

5 Min Read
Not Ready for Cloud Security? Here Are 5 Things You Can Do in the Meantime

Travis Wilkins

July 25, 2017

If you are currently running an on-premise or hybrid environment with an eye to eventually making a complete transition to the cloud, you may be ...

5 Min Read
5 Considerations for Evaluating a Cloud Security Solution

Travis Wilkins

July 7, 2017

Many companies today are turning to cloud security solutions — from security monitoring platforms to orchestration tools to alerting systems — in ...

4 Min Read
The RNC Data Exposure: Learnings and Actions to Take

Natalie Walsh

June 23, 2017

Recently, headlines were hyping the largest ever exposure of voter information, involving some 9.5 billion data points related to 198 million U.S. ...

5 Min Read
14 Questions to Ask Yourself Before Committing to a Cybersecurity Vendor

Natalie Walsh

June 14, 2017

Update: For an interesting discussion of this post, take a listen to this Security Weekly podcast. The discussion starts at 8 minutes, 10 ...

3 Min Read
Vulnerable vs. Exploitable: Why These are Different & Why it Matters

Anthony Alves

June 13, 2017

Pop quiz: What’s the difference between vulnerable and exploitable? As we’ve written before, a vulnerability is a weakness in a software ...

5 Min Read
How to Prioritize Security Tasks When You Have Limited Resources

Travis Wilkins

June 7, 2017

Many organizations have limited resources (time, personnel, and money) for IT, and oftentimes only a small portion of that is devoted to security. ...

4 Min Read
10 Best Practices for Securing Your Workloads on AWS

Michal Ferguson

May 25, 2017

Achieving optimal security in a cloud environment can seem like a moving target. New security threats are constantly popping up along with security ...

4 Min Read
Assessing the State of the Shared Responsibility Model

Michal Ferguson

May 23, 2017

We hear (and at Threat Stack, we write) a lot about the shared security responsibility model. This is the idea that, when it comes to the cloud, ...

4 Min Read
Why You Don’t Need to Code to Run Secure on AWS

Megan Rees Ahigian

May 9, 2017

Amazon Web Services, the ubiquitous cloud infrastructure provider, has made it increasingly easy for businesses to move to the cloud and take ...

5 Min Read
The Real Implications of The Shared Security Model

Pete Cheslock

May 8, 2017

Gone are the days when the majority of businesses could point to the cloud warily and say, “I think my data’s safer on-prem.” Organizations ...