Latest Blogs About "Threat Stack"

125 total posts.

2 Min Read
OneLogin Gains Granular Security Control With Threat Stack on AWS

Michal Ferguson

May 22, 2017

OneLogin’s Journey on AWS OneLogin, an identity and access management (IAM) company, is dedicated to superior security for their users, which ...

3 Min Read
Threat Stack Visitors Guide to Boston

The Threat Stack Team

May 2, 2017

Welcome to Boston! Our city plays host to many tech conferences throught the year — and Threat Stack actively sponsors and particpates in many ...

6 Min Read
Eyes on the Ground: Why You Need Security Agents

Nathan Cooprider

April 28, 2017

A post based on the talk I just gave at SOURCE Boston 2017 If you answer Yes to one or more of the following questions, you probably have agent ...

2 Min Read
New Threat Stack Feature: S3 File Integrity Monitoring

Venkat Pothamsetty

January 17, 2017

Threat Stack customers receive a great deal of value from our Linux File Integrity Monitoring (FIM), and we have now extended that capability to ...

2 Min Read
Boston Cloud Security & Incident Management Workshop Recap

Tom McLaughlin

January 13, 2017

Last night we got together with our good friends from PagerDuty to host an event at District Hall in the Seaport area of Boston. It was a fun ...

3 Min Read
MineralTree Achieves PCI Compliance With Threat Stack

Kevin Eberman

January 9, 2017

Compliance processes have a reputation for being expensive, time-consuming, and fraught with difficulties — and sometimes certifications are looked ...

5 Min Read
According to Our Readers: Threat Stack’s Top 10 Blog Posts for 2016 (and More)

Tim Armstrong

December 28, 2016

One of our goals at Threat Stack is sharing information that will help you learn about the current cloud security threat landscape in order to ...

< 1 Min Read
The Cloud Security Use Cases Playbook

Venkat Pothamsetty

December 15, 2016

Over the last year, we have published a number of playbooks that, together, deliver strategic and tactical information to guide you from high-level ...

4 Min Read
Measurably Decreasing Mean-Time-To-Know With Threat Stack

Craig Chamberlain

December 13, 2016

In our last post, we took a look at traditional security incident response vs. the possibility to dramatically increase security velocity (which I ...

3 Min Read
Threat Stack Cloud Security Platform: Streamlined Workflows, Part 2

Megan Rees Ahigian

November 30, 2016

In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security ...

3 Min Read
Threat Stack Cloud Security Platform: Streamlined Workflows, Part 1

Megan Rees Ahigian

November 16, 2016

At Threat Stack, we have two high-level goals when it comes to product development. First, we want to continue to build a powerful, cloud-based ...

3 Min Read
Increasing Security Response Velocity

Craig Chamberlain

November 1, 2016

I recently added a Starz subscription to my Amazon Prime and found a new supply of science fiction movies. One of these, Deja Vu, is a time travel ...

5 Min Read
Better Security Through UX Part 3: Responsiveness & Performance

Jim O'Neill

October 31, 2016

This series explores how good UI design plays a key role in keeping users secure by making them more inclined to trust and use their cloud security ...

5 Min Read
Anatomy of an Attack: How the Cloud Gets Hacked

Tim Armstrong

October 24, 2016

The cloud is very different from on-premise infrastructure in several key ways. Some of these differences become apparent when it comes to external ...

2 Min Read
Threat Stack Supports Tech Gives Back & St. Baldrick’s

Brian Ahern

October 20, 2016

With 2016 nearing an end, I can’t help reflecting on how fortunate I am in my personal and professional life. I am blessed with a beautiful, ...

5 Min Read
Better Security Through UX, Part 2: Visual Design and Emotion

Jim O'Neill

September 28, 2016

In Part 1 of this series, I introduced the theme that good user experience (UX) design can actually promote better security overall, by fostering ...

2 Min Read
Building Strong Partnerships: Why We’re a Proud Sponsor of the PagerDuty Summit

Threat Stack Marketing Team

September 20, 2016

After the Threat Stack team attended last week’s PagerDuty Summit in San Francisco, it became clear why PagerDuty is the market leader in agile ...

3 Min Read
Proactive Software Testing Meets Proactive Security Monitoring at Applause

Thom Kenney

September 7, 2016

Software bugs, like security vulnerabilities, can crop up in unexpected places, and the only way you can really be prepared for them is by testing ...

3 Min Read
IoT Meets Continuous Security Monitoring at Ayla Networks

Adrian Caceres

August 11, 2016

Ayla Networks is an Internet of Things (IoT) cloud platform-as-a-service (PaaS) company that enables manufacturers to build connected products. With ...

3 Min Read
Better Security Through UX, Part 1

Jim O'Neill

August 10, 2016

How effective is a security tool if people don’t like using it? A fancy floor mop sits in my closet. It’s a Swiffer WetJet, and with one look ...

4 Min Read
From Agent Install to Mean Time to Know in Less Than 5 Minutes

Threat Stack Engineering Team

August 2, 2016

They say timing is everything — and when you go from installing an agent to detecting and remediating a security breach in less than 5 minutes, it ...