Latest Blogs About "General"

99 total posts.

4 Min Read
PART ONE: How Threat Stack Reduces MTTK through Smart UI Design

Amber Bennoui

July 21, 2021

Author’s note: This blog post is the first in a two-part series around how Threat Stack approaches its UI design for cybersecurity use cases. The ...

3 Min Read
Shrink Mean Time-To-Know With Real-Time AWS EC2 Metadata

Rob Young

February 2, 2021

When the cybersecurity team receives an indicator of a potential attack, every minute counts. The longer it takes to determine whether an alert is ...

7 Min Read
10 Tips for Keeping Companies and Remote Workers Secure & Productive

Mark Moore

April 7, 2020

Telecommuting — also known as working from home (WFH), remote working, and a number of other names — has been around for about 50 years, having ...

4 Min Read
Tips on How to Stay Secure at Conferences

Pat Cable

December 10, 2019

At Threat Stack, we attend a lot of conferences: They can be a powerful way to connect with like-minded professionals and educate yourself on ...

4 Min Read
AWS re:Inforce 2019 Recap: A Look Back at the First AWS Security Show

Jackson Connell

June 27, 2019

The last day of the first AWS re:Inforce conference has wrapped up and it’s time to take the lessons we learned back to the office and put them ...

4 Min Read
AWS re:Inforce 2019 — Day 1 Recap

Jackson Connell

June 26, 2019

Note: For a recap of Day 2,  please take a look at AWS re:Inforce Recap: A Look Back at the First AWS Security Show. Day 1 of AWS re:Inforce ...

6 Min Read
Tips on Recruiting Top Talent in the Current DevOps and Cloud Security Markets

Shaun Kelly

June 6, 2019

Q&A With Michael Race, Senior Consultant in Cloud/Infrastructure Security and DevSecOps at Stott and May Hiring and retaining talent in ...

2 Min Read
Scala Regex String Extraction

Alfredo Perez

February 26, 2019

Introduction — Joe Baker, Manager Software Engineering From time to time the Engineering, Operations, and Security groups at Threat Stack ...

3 Min Read
AWS re:Invent 2018 Recap: Security, DevOps, ML, & Hybrid Cloud Take Center Stage

Steve Lowing

November 30, 2018

Another year at AWS re:Invent has come and gone. As usual it was a jam packed show full of exciting announcements, great keynotes, sessions, and ...

2 Min Read
Destiny is Defined by the Journey: Acquired by Palo Alto Networks

Brian Ahern

March 15, 2018

Congratulations to on having your cloud story acquired by Palo Alto Networks. Your vision, passion, and commitment have been rightly ...

5 Min Read
How CEOs Can Be a Cybersecurity Liability (And What to Do About It)

Michal Ferguson

February 28, 2018

Good CEOs are committed to moving their companies forward, increasing revenue, and ensuring that their teams are productive. When business challenges ...

2 Min Read
5 Ways to Strengthen Your SaaS Security & Build Customer Loyalty: eBook Download

Threat Stack Marketing Team

February 22, 2018

The SaaS subscription model can make churn an unavoidable issue because there’s nothing to prevent customers from cutting ties with one provider ...

3 Min Read
Resources to Help You Carry Out Your 2018 Security Resolutions

Threat Stack Marketing Team

January 15, 2018

The other week we outlined a number of resolutions to put you on the path to a cyber-secure 2018. In this post we’re going to direct you to some of ...

4 Min Read
Threat Stack’s 2018 New Year’s Security Resolutions

Threat Stack Product Team

January 3, 2018

Insights from Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support Instead of the “predictions” that are ...

5 Min Read
How We Can Turn National Cybersecurity Awareness Month Into Cybersecurity Action

Bob Allin

October 12, 2017

Want to take a peek at the World’s Worst Data Breaches? Here you ...

4 Min Read
5 Security Blogs Your CFO Needs to Read

Kevin Durkin

September 28, 2017

Before I started working at Threat Stack, security was not always at the top of my priority list. Now, as the CFO of a leading cloud security ...

2 Min Read
Massachusetts Takes Leadership Role in Cybersecurity

Brian Ahern

September 21, 2017

Threat Stack Welcomes New Massachusetts Cybersecurity Growth and Development Center Last week, during the inaugural Cybersecurity Forum, ...

4 Min Read
How to Align Security With Your Business Objectives

Natalie Walsh

September 12, 2017

Aligning security with your organization’s  greater business needs is becoming increasingly important, but how do you actually do it? What it ...

5 Min Read
How Companies Can Provide Security Transparency to Customers and Prospects

Jim McDonough

June 21, 2017

Leveraging Security in the Sales Process Security is more than just a good business practice. It also serves as insurance for your customers that ...

6 Min Read
Risk Acceptance & Business Payout

Travis Wilkins

June 15, 2017

Key Takeaways From the Gartner Security & Risk Management Summit 2017 I just got back from the Gartner Security & Risk Management Summit ...

4 Min Read
Five OpSec Best Practices to Live By

Threat Stack Marketing Team

April 24, 2017

Often when we talk about security, we focus on the mechanics of how to keep technical infrastructure safe. It can be easy to forget that operational ...