Latest Blogs About "Threat Stack Use Cases"

54 total posts.

2 Min Read
New Threat Stack Feature: S3 File Integrity Monitoring

Venkat Pothamsetty

January 17, 2017

Threat Stack customers receive a great deal of value from our Linux File Integrity Monitoring (FIM), and we have now extended that capability to ...

3 Min Read
MineralTree Achieves PCI Compliance With Threat Stack

Kevin Eberman

January 9, 2017

Compliance processes have a reputation for being expensive, time-consuming, and fraught with difficulties — and sometimes certifications are looked ...

4 Min Read
Measurably Decreasing Mean-Time-To-Know With Threat Stack

Craig Chamberlain

December 13, 2016

In our last post, we took a look at traditional security incident response vs. the possibility to dramatically increase security velocity (which I ...

3 Min Read
Threat Stack Cloud Security Platform: Streamlined Workflows, Part 2

Megan Rees Ahigian

November 30, 2016

In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security ...

3 Min Read
Threat Stack Cloud Security Platform: Streamlined Workflows, Part 1

Megan Rees Ahigian

November 16, 2016

At Threat Stack, we have two high-level goals when it comes to product development. First, we want to continue to build a powerful, cloud-based ...

3 Min Read
Increasing Security Response Velocity

Craig Chamberlain

November 1, 2016

I recently added a Starz subscription to my Amazon Prime and found a new supply of science fiction movies. One of these, Deja Vu, is a time travel ...

5 Min Read
Better Security Through UX Part 3: Responsiveness & Performance

Jim O'Neill

October 31, 2016

This series explores how good UI design plays a key role in keeping users secure by making them more inclined to trust and use their cloud security ...

2 Min Read
Threat Stack Supports Tech Gives Back & St. Baldrick’s

Brian Ahern

October 20, 2016

With 2016 nearing an end, I can’t help reflecting on how fortunate I am in my personal and professional life. I am blessed with a beautiful, ...

5 Min Read
Better Security Through UX, Part 2: Visual Design and Emotion

Jim O'Neill

September 28, 2016

In Part 1 of this series, I introduced the theme that good user experience (UX) design can actually promote better security overall, by fostering ...

3 Min Read
Proactive Software Testing Meets Proactive Security Monitoring at Applause

Thom Kenney

September 7, 2016

Software bugs, like security vulnerabilities, can crop up in unexpected places, and the only way you can really be prepared for them is by testing ...

3 Min Read
IoT Meets Continuous Security Monitoring at Ayla Networks

Adrian Caceres

August 11, 2016

Ayla Networks is an Internet of Things (IoT) cloud platform-as-a-service (PaaS) company that enables manufacturers to build connected products. With ...

3 Min Read
Better Security Through UX, Part 1

Jim O'Neill

August 10, 2016

How effective is a security tool if people don’t like using it? A fancy floor mop sits in my closet. It’s a Swiffer WetJet, and with one look you ...

4 Min Read
From Agent Install to Mean Time to Know in Less Than 5 Minutes

Threat Stack Engineering Team

August 2, 2016

They say timing is everything — and when you go from installing an agent to detecting and remediating a security breach in less than 5 minutes, it ...

2 Min Read
Why Sprout Social Chose Threat Stack to Secure Social Data for More Than 17,000 Brands

Aaron Rankin, CTO & Co-Founder of Sprout Social

July 26, 2016

The growth of content in social media is astounding. Today, brands receive 400% more social messages than they did a year ago. The nature of these ...

3 Min Read
How Twine Health Ensures Complete PHI Security and Privacy: Going Beyond HIPAA Checkboxes

Bradley Harris

July 22, 2016

Twine Health is a SaaS-based healthcare platform that connects patients and providers to enable collaborative care. We do business with entities as ...

2 Min Read
Innovation and a Results-Oriented Culture Continue to Drive Success

Brian Ahern

July 11, 2016

As we enter the “dog days of summer,” we can’t help but reflect on the many events — regional, national, and global — that have been ...

2 Min Read
Using AWS Tags With Threat Stack Security Alerts

Venkat Pothamsetty

June 3, 2016

Since first releasing Threat Stack Cloud Security Platform®, we continue to make enhancements that provide better data, increase ...

5 Min Read
Who is That EC2 User?

Venkat Pothamsetty

May 17, 2016

Identity management is a difficult problem in the cloud, especially when it comes to sharing user accounts — an all too familiar (and problematic) ...

4 Min Read
No Magick Here: How to Detect ImageTragick (CVE-2016–3714) With Threat Stack

Pete Cheslock

May 5, 2016

On May 3rd the ImageMagick security team posted on their blog a possible remote code execution vulnerability involving specially crafted images. For ...

3 Min Read
A Big Week: Threat Stack, Fundraising, and the Boston Marathon

Brian Ahern

April 21, 2016

On Monday I had the pleasure of watching the Boston Marathon and cheering on thousands of runners: some running for results, many running for a ...

2 Min Read
Threat Stack Secures $15.3 Million in Series B Funding

Christopher Lynch

April 19, 2016

If you’re paying attention to modern-day software conversations, it often feels like the “old way” has already been put to rest, replaced by ...