Latest Blogs About "General"

99 total posts.

7 Min Read
Cicadas & Security, Part 2: When a Verified PGP Key Takes You on a Trip to the Desert

Toni Noble

April 19, 2017

Update! A message from Cicada was discovered on Pastebin at the end of April 2017. It read "Beware false paths.  Always verify PGP signature from ...

5 Min Read
Boston-Based Venture Capitalists Weigh in on the Importance of Cybersecurity

Greg Dracon

March 8, 2017

At Threat Stack we have developed best practices around cloud security — when it should be introduced, what it should cover at each stage of the ...

3 Min Read
How to Stay Secure on Slack

Pete Cheslock

February 27, 2017

If you’re already on the Slack bandwagon, then you have probably experienced first-hand how it can make communications between teams far simpler ...

4 Min Read
Don’t Make Perfect Security the Enemy of Good Security

Tim Armstrong

February 24, 2017

We’ve written before about what it means to meet compliance standards without going completely overboard. Today, we want to talk about how that ...

3 Min Read
Cicadas & Security: How an Alternate Reality Game Teaches Encryption and Security Best Practices, Part 1

Toni Noble

January 6, 2017

When you think of alternate reality games (ARGs), things such as Ingress or Pokemon GO probably come to mind. While thinking about ways ...

5 Min Read
Post Mortem: Death Star Data Breach by ROGUE ONE

Tom McLaughlin

December 16, 2016

Recently the Galactic Empire's Death Star plans were leaked due to a security breach on the planet Scarif. A threat actor known as ROGUE ONE ...

3 Min Read
The USENIX LISA 2016 Conference: In Their Own Words

Tom McLaughlin

December 16, 2016

The USENIX LISA 2016 Conference wrapped up a week ago after a tremendous five-day program of workshops, training sessions, presentations, talks, and ...

4 Min Read
Where to Find Security Talent & How to Keep Them Happy

Tim Armstrong

December 7, 2016

It’s no secret that there’s a huge talent shortage in the security space today. With a low supply and high demand, salaries have surged, ...

5 Min Read
AWS re:Invent 2016 Sets Records for New Services and Attendance

Tom McLaughlin

December 5, 2016

Interested in attending AWS re:Invent 2017? Take a look at what we'll be up to. AWS re:Invent 2016 has come and gone and what an event it was! ...

3 Min Read
USENIX LISA16 Visitors Guide to Boston

The Threat Stack Team

November 7, 2016

If you’re heading to this year’s upcoming USENIX LISA Conference — welcome to Boston! Threat Stack is a proud sponsor of the conference, ...

4 Min Read
The How vs the Who: An Argument Against Attribution & Hack Back

Sam Bisbee

November 2, 2016

A lot of organizations focus their efforts on identifying external actors, distinguishing between different groups that may be attempting malicious ...

3 Min Read
A Look Back at AppSecUSA: From Application Security to DevOps and Beyond

Tim Armstrong

October 18, 2016

Last week I spent two fantastic days in Washington, DC attending the AppSecUSA Conference on behalf of Threat Stack, one of the event’s Silver ...

3 Min Read
Cloud Security: Where to Get Started, Part 2

Pete Cheslock

October 17, 2016

Last week, we released Part 1 of a two-part series on the low-hanging security best practices companies can implement to improve their security ...

4 Min Read
Cloud Security: Where to Get Started, Part 1

Pete Cheslock

October 13, 2016

If you look at how and when different companies implement security, it’s clear the approach runs the gamut. Some go all in from day one while many ...

3 Min Read
How Cloud Security Can Accelerate Your Sales Cycle

Jim McDonough

September 6, 2016

From my first day at Threat Stack, I’ve encountered one critical issue time after time: prospects who have had their sales cycle slow to a crawl or ...

3 Min Read
How to Build Lifetime Relationships With SaaS Customers

Devin Behenna

July 21, 2016

On-demand, subscription-based services have taken over the technology world; a “one-and-done” contract is almost unheard of in today’s software ...

4 Min Read
Pokémon GO & Security: Who are All These Strange People in the Lobby?

Tom McLaughlin

July 12, 2016

Just in case you were wondering, the @nytimes building is a Pokegym. — Runa A. Sandvik (@runasand) ...

3 Min Read
Customer Success Management — in the Cloud!

Devin Behenna

June 28, 2016

Customer Success Management (CSM) is becoming one of the most important practices for driving customer success throughout the SaaS B2B sector. ...

4 Min Read
The Point Security Solution Implosion: 4 Things Companies Need to Know

Threat Stack Marketing Team

June 9, 2016

Not even a decade ago, security was much simpler. Companies were defined by the perimeter of their corporate network and protected by a firewall and ...

4 Min Read
How to Become a Great Business Development Representative

Mimi Alperovich

June 6, 2016

About a week ago I started a fantastic new role as Director of Sales Prospecting & Business Development at the Boston-based Cloud Security ...

4 Min Read
Why I Deferred Harvard to Work Full Time at a Startup

Michael Chen

May 25, 2016

After my third year as a Harvard computer science major, I decided to defer my degree to start working as a full-time software engineer at Threat ...