Latest Blogs About "General"

97 total posts.

7 Min Read
10 Tips for Keeping Companies and Remote Workers Secure & Productive

Mark Moore

April 7, 2020

Telecommuting — also known as working from home (WFH), remote working, and a number of other names — has been around for about 50 years, having ...

4 Min Read
Tips on How to Stay Secure at Conferences

Pat Cable

December 10, 2019

At Threat Stack, we attend a lot of conferences: They can be a powerful way to connect with like-minded professionals and educate yourself on ...

4 Min Read
AWS re:Inforce 2019 Recap: A Look Back at the First AWS Security Show

Jackson Connell

June 27, 2019

The last day of the first AWS re:Inforce conference has wrapped up and it’s time to take the lessons we learned back to the office and put them ...

4 Min Read
AWS re:Inforce 2019 — Day 1 Recap

Jackson Connell

June 26, 2019

Note: For a recap of Day 2,  please take a look at AWS re:Inforce Recap: A Look Back at the First AWS Security Show. Day 1 of AWS re:Inforce ...

6 Min Read
Tips on Recruiting Top Talent in the Current DevOps and Cloud Security Markets

Shaun Kelly

June 6, 2019

Q&A With Michael Race, Senior Consultant in Cloud/Infrastructure Security and DevSecOps at Stott and May Hiring and retaining talent in ...

2 Min Read
Scala Regex String Extraction

Alfredo Perez

February 26, 2019

Introduction — Joe Baker, Manager Software Engineering From time to time the Engineering, Operations, and Security groups at Threat Stack ...

3 Min Read
AWS re:Invent 2018 Recap: Security, DevOps, ML, & Hybrid Cloud Take Center Stage

Steve Lowing

November 30, 2018

Another year at AWS re:Invent has come and gone. As usual it was a jam packed show full of exciting announcements, great keynotes, sessions, and ...

2 Min Read
Destiny is Defined by the Journey: Acquired by Palo Alto Networks

Brian Ahern

March 15, 2018

Congratulations to on having your cloud story acquired by Palo Alto Networks. Your vision, passion, and commitment have been rightly ...

5 Min Read
How CEOs Can Be a Cybersecurity Liability (And What to Do About It)

Michal Ferguson

February 28, 2018

Good CEOs are committed to moving their companies forward, increasing revenue, and ensuring that their teams are productive. When business challenges ...

2 Min Read
5 Ways to Strengthen Your SaaS Security & Build Customer Loyalty: eBook Download

Threat Stack Marketing Team

February 22, 2018

The SaaS subscription model can make churn an unavoidable issue because there’s nothing to prevent customers from cutting ties with one provider ...

5 Min Read
Resources to Help You Carry Out Your 2018 Security Resolutions

Threat Stack Marketing Team

January 15, 2018

The other week we outlined a number of resolutions to put you on the path to a cyber-secure 2018. In this post we’re going to direct you to some of ...

4 Min Read
Threat Stack’s 2018 New Year’s Security Resolutions

Threat Stack Product Team

January 3, 2018

Insights from Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support Instead of the “predictions” that are ...

5 Min Read
How We Can Turn National Cybersecurity Awareness Month Into Cybersecurity Action

Bob Allin

October 12, 2017

Want to take a peek at the World’s Worst Data Breaches? Here you ...

4 Min Read
5 Security Blogs Your CFO Needs to Read

Kevin Durkin

September 28, 2017

Before I started working at Threat Stack, security was not always at the top of my priority list. Now, as the CFO of a leading cloud security ...

2 Min Read
Massachusetts Takes Leadership Role in Cybersecurity

Brian Ahern

September 21, 2017

Threat Stack Welcomes New Massachusetts Cybersecurity Growth and Development Center Last week, during the inaugural Cybersecurity Forum, ...

4 Min Read
How to Align Security With Your Business Objectives

Natalie Walsh

September 12, 2017

Aligning security with your organization’s  greater business needs is becoming increasingly important, but how do you actually do it? What it ...

5 Min Read
How Companies Can Provide Security Transparency to Customers and Prospects

Jim McDonough

June 21, 2017

Leveraging Security in the Sales Process Security is more than just a good business practice. It also serves as insurance for your customers that ...

6 Min Read
Risk Acceptance & Business Payout

Travis Wilkins

June 15, 2017

Key Takeaways From the Gartner Security & Risk Management Summit 2017 I just got back from the Gartner Security & Risk Management Summit ...

4 Min Read
Five OpSec Best Practices to Live By

Threat Stack Marketing Team

April 24, 2017

Often when we talk about security, we focus on the mechanics of how to keep technical infrastructure safe. It can be easy to forget that operational ...

7 Min Read
Cicadas & Security, Part 2: When a Verified PGP Key Takes You on a Trip to the Desert

Toni Noble

April 19, 2017

Update! A message from Cicada was discovered on Pastebin at the end of April 2017. It read "Beware false paths.  Always verify PGP signature from ...

5 Min Read
Boston-Based Venture Capitalists Weigh in on the Importance of Cybersecurity

Greg Dracon

March 8, 2017

At Threat Stack we have developed best practices around cloud security — when it should be introduced, what it should cover at each stage of the ...