Latest Blogs About "Cloud Security"

179 total posts.

5 Min Read
How to Prioritize Security Tasks When You Have Limited Resources

Travis Wilkins

June 7, 2017

Many organizations have limited resources (time, personnel, and money) for IT, and oftentimes only a small portion of that is devoted to security. ...

4 Min Read
10 Best Practices for Securing Your Workloads on AWS

Michal Ferguson

May 25, 2017

Achieving optimal security in a cloud environment can seem like a moving target. New security threats are constantly popping up along with security ...

4 Min Read
Assessing the State of the Shared Responsibility Model

Michal Ferguson

May 23, 2017

We hear (and at Threat Stack, we write) a lot about the shared security responsibility model. This is the idea that, when it comes to the cloud, ...

4 Min Read
Why You Don’t Need to Code to Run Secure on AWS

Megan Rees Ahigian

May 9, 2017

Amazon Web Services, the ubiquitous cloud infrastructure provider, has made it increasingly easy for businesses to move to the cloud and take ...

5 Min Read
The Real Implications of The Shared Security Model

Pete Cheslock

May 8, 2017

Gone are the days when the majority of businesses could point to the cloud warily and say, “I think my data’s safer on-prem.” Organizations ...

4 Min Read
Why Automated Security Threats are Proliferating and How to Fight Back

Anthony Alves

April 25, 2017

We’ve written before about the importance of looking inward, rather than out, when it comes to evaluating what types of cyberattacks are the ...

2 Min Read
73% of Companies Have Critical AWS Security Misconfigurations

Jackson Connell

April 18, 2017

Threat Stack Delivers Wake Up Call Wide open SSH and infrequent software updates among top risks identified in the majority of cloud-based ...

5 Min Read
5 Things All Security Teams Should Be Doing (But Many Aren’t)

Anthony Alves

April 13, 2017

Security teams are expected to do a lot these days. From properly configuring the cloud environment, to protecting the organization from today’s ...

5 Min Read
The 5 Questions Your Security Team Should Be Able to Answer

Anthony Alves

April 10, 2017

In a time when security consciousness is high and stories about security breaches are all too frequently in the headlines, your security team needs ...

6 Min Read
Calculating TCO: The Real Cost of Cloud Security

Chris Gervais

April 5, 2017

This post examines the total cost of ownership (TCO) of a cloud security system, not in terms of the actual dollars and cents cost of a system, but ...

3 Min Read
New Playbook: Jump Starting Your Cloud Security Journey

Tom McLaughlin

April 4, 2017

Cloud security is a complex subject, and customers sometimes tell us that one of their biggest challenges is simply knowing where to start. In ...

6 Min Read
Steps for Establishing Your AWS Security Roadmap

The Threat Stack Team

March 10, 2017

Yesterday, we hosted one of our most popular webinars to date: Steps for Establishing Your AWS Security Roadmap. Threat Stack’s VP of Engineering, ...

6 Min Read
Reliable UNIX Log Collection in the Cloud

Pat Cable

February 28, 2017

One way organizations can improve their security and operational ability is to collect logs in a central location. Centralized logging allows ...

16 Min Read
Cloud Security Best Practices: Finding, Securing, & Managing Secrets, Part 2

Tom McLaughlin

February 26, 2017

In Part 1 of this post we explained how you can find all the secrets in your environment. In Part 2 we will discuss effective ways to store and ...

5 Min Read
How to Talk to Your Prospects About Cloud Security

Jim McDonough

February 23, 2017

Security can be a huge sales and business enabler, as I've mentioned before. If your company and its prospective customers are in a regulated ...

4 Min Read
W-2 Phishing Scams: What You Need to Know to Stay Secure

Kevin Durkin

February 10, 2017

The IRS recently issued a warning that W-2 phishing scams are on the rise. In fact, 29,000 victims have already been claimed in 2017 to date! The ...

5 Min Read
Planning Your Cloud Security Program

Tom McLaughlin

February 7, 2017

As we stated in the introduction to this blog post series, our purpose is to give you insight into the issues you should address when you are at the ...

4 Min Read
Ignore the Splashy Headlines: Why Security Should Look Inward, Not Out

Bob Allin

February 6, 2017

It’s easy to get distracted by splashy headlines about breaches at corporations with household names. And of course state-sponsored, targeted ...

2 Min Read
Threat Stack Blog Series: Starting Your Cloud Security Journey

Tom McLaughlin

February 3, 2017

More and more companies are migrating to the cloud — and for good reason considering the many benefits such as speed, flexibility, and reduced ...

4 Min Read
How to Choose the Right Tools for Incident Management and Reporting

Tim Armstrong

January 31, 2017

Your incident management process is greatly impacted by the tools you have available to carry it out. Technology should be your friend when it comes ...

4 Min Read
How to Use Automation to Improve Your Cloud Security Posture

Tim Armstrong

January 27, 2017

Automating security processes and workflows can help teams lower Mean Time To Resolution (MTTR), maintain or strengthen an organization’s security ...