The SaaS subscription model can make churn an unavoidable issue because there’s nothing to prevent customers from cutting ties with one provider and moving to another.
As a security or operations professional at a SaaS company, you know you have to address trust and loyalty at the platform level so your customers experience optimal performance. You also know you have to deal with the unique security requirements associated with your SaaS infrastructure. The good news is, if you take steps to ensure platform stability, performance, and data security, you’ll be well-positioned to attract prospects and build long-term customer trust.
To help you get there, our new eBook — 5 Ways to Strengthen Your SaaS Security & Build Customer Loyalty — offers practical advice and specific steps you can take to avoid operational pitfalls, secure your SaaS business, and give customers the assurances they need to stay loyal to your service. Read more “New eBook: 5 Ways to Strengthen Your SaaS Security & Build Customer Loyalty”
As a SaaS provider, securing your environment from known threats is one thing, but how about the unknown? That’s a different story altogether, and it’s exactly why the security community is so worked up over Meltdown and Spectre. With so much to learn about the newly discovered vulnerabilities and the threats they pose, many have been sent into a bit of a tailspin. But, before you give in to the panic, we’ve laid out specific steps below that can help you mitigate the risks in order to keep your data and that of your customers secure. Read more “Meltdown & Spectre: How to Secure Your SaaS Environment From Unknown Threats”
As you’re probably well aware by now, security is different in the cloud. The good news, of course, is that running in the cloud offers more visibility than ever before. It’s now possible to gain a bird’s-eye view of your entire environment, something that was unimaginable with on-premise data centers.
In partnership with Dark Reading, Threat Stack’s VP of Product, Chris Ford, got together in a recent webinar to discuss measurement and monitoring in the realm of cloud security with Rich Mogull, CEO and Analyst at Securosis. You can read the recap below or view the entire webinar here. Read more “Strategies for Measuring and Monitoring the Cloud Like a Boss — Webinar Recap”
This post discusses the Meltdown and Spectre vulnerabilities, provides some proactive actions that can be taken to mitigate them, and also discusses the use of behavior-based analysis to detect attacks that take advantage of these or similar vulnerabilities, regardless of their signature. Read more “Meltdown & Spectre: What You Need to Know”
Strong security is vital to any SaaS company, enabling platform stability and integrity while instilling confidence in potential customers.
There’s nothing new in this statement, but, with an eye on the bottom line, C-Level executives, board members, and VC firms often take a little more convincing when it comes to implementing new cloud security strategies — especially if it means shelling out cash for new solutions or team members. Obtaining buy-in for new security initiatives can be a time-consuming task requiring several layers of validation.
There’s a very real risk of security initiatives losing out to more obvious business drivers when it comes time for budget allocation. But as an IT or security team lead, it’s your job to advocate for security priorities. In this post, we’ll outline the steps you can take to get the green light you need for your cloud security strategy. Read more “How to Obtain Buy-in on Security Initiatives for Your SaaS Company”
The other week we outlined a number of resolutions to put you on the path to a cyber-secure 2018. In this post we’re going to direct you to some of the resources we produced in 2017 that will help you carry out those resolutions.
2017 was an eventful year in the cybersecurity world — to say the least! It seems that every day a new threat or major breach was causing a stir — whether it was Equifax, the RNC voter data exposure, WannaCry, Uber, Alteryx, or — to start the new year — Spectre and Meltdown!
If you want to take a look at the World’s Worst Data Breaches, here you go. But we’re going to stick to our preferred approach: After you read the splashy headlines, look inward to make sure your own data and systems are secure. To help you secure and manage your cloud environments, we’ve put together a summary of a few of the great resources we produced in 2017. Read more “Resources to Help You Carry Out Your 2018 Security Resolutions”
So, you’ve finally gotten the cloud security conversation started at your organization, have a rough budget set aside, and your team is eager to get started. Now what? If you’re new to the world of security, have never managed security in the cloud before, or simply need some guardrails to help you get started, this post will break down everything you need to know.
Below are five sequenced steps to take when embarking on a new cloud security journey. Follow them and you’ll be on the path to strengthening your organization’s cloud security posture. Read more “Your Personal Guide to Cloud Security 101”
Every organization is unique in the way it functions and the role each team member plays. So when it comes to security, the very first thing you need to do before kicking off a program or updating your strategy is to decide how security will be driven in your organization and how decisions will be made. While this may be managed formally in larger organizations, smaller companies that don’t have a dedicated security team need to structure their approach to security to ensure that they can create effective security coverage using their more limited resources.
With that in mind, here are four recommendations for getting started with a security program in your organization. Read more “Getting Started With Security? Here’s the Very First Thing to Do”
The global shortage of cybersecurity talent shows no signs of abating, making it harder than ever for smaller businesses to compete for qualified talent. But even if prospects were available and even if you had unlimited budget, throwing resources at the problem would not be the best way to address your security challenges. Instead, we recommend coordinating your limited resources and rethinking security as a shared mission for the entire organization rather than a discrete department.
If you’re facing limited resources and security talent, you can still run secure by following best practices for getting the most out of what you do have. Here are four or our recommendations for running lean in the cloud. Read more “Doing More With Less: 4 Ways to Run a Successful, Lean Security Team”
Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support
Instead of the “predictions” that are usually offered up at this time of year, we decided to focus on security resolutions. So rather than surveying a variety of issues that might (or might not) affect your security operations in the coming year, we want to talk about resolutions that, if you put them into play and follow through rigorously, will offer a sure way of strengthening your organization’s security habits and posture.
Security should never be thought of as a one-and-done proposition. It’s an ongoing, evolving process, and instead of “getting secure,” smart organizations focus on continuously improving their security postures. As with any other type of improvements you want to make, it can be helpful to take a moment to pause and consider your goals for the coming year. Instead of good intentions that don’t translate into action, make resolutions around the reality of today’s security landscape and the very real challenges that are likely to arise in your organization in 2018.
To help you do this, we sat down with two of our cloud security experts, Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support, to ask them what resolutions they recommend companies make regarding security in 2018. Here’s what they had to say. Read more “Threat Stack’s 2018 New Year’s Security Resolutions”