Latest Blogs About "Uncategorized"

90 total posts.

3 Min Read
DevOpsing at Home

Vitaliy Zakharov

March 13, 2017

I remember the days when SysAdmins bragged about server uptimes that were sometimes measured in years. I have been out of the SysAdmin world for ...

2 Min Read
Boston Cloud Security & Incident Management Workshop Recap

Tom McLaughlin

January 13, 2017

Last night we got together with our good friends from PagerDuty to host an event at District Hall in the Seaport area of Boston. It was a fun ...

3 Min Read
Cicadas & Security: How an Alternate Reality Game Teaches Encryption and Security Best Practices, Part 1

Toni Noble

January 6, 2017

When you think of alternate reality games (ARGs), things such as Ingress or Pokemon GO probably come to mind. While thinking about ways ...

5 Min Read
According to Our Readers: Threat Stack’s Top 10 Blog Posts for 2016 (and More)

Tim Armstrong

December 28, 2016

One of our goals at Threat Stack is sharing information that will help you learn about the current cloud security threat landscape in order to ...

5 Min Read
Post Mortem: Death Star Data Breach by ROGUE ONE

Tom McLaughlin

December 16, 2016

Recently the Galactic Empire's Death Star plans were leaked due to a security breach on the planet Scarif. A threat actor known as ROGUE ONE ...

3 Min Read
The USENIX LISA 2016 Conference: In Their Own Words

Tom McLaughlin

December 16, 2016

The USENIX LISA 2016 Conference wrapped up a week ago after a tremendous five-day program of workshops, training sessions, presentations, talks, and ...

5 Min Read
AWS re:Invent 2016 Sets Records for New Services and Attendance

Tom McLaughlin

December 5, 2016

Interested in attending AWS re:Invent 2017? Take a look at what we'll be up to. AWS re:Invent 2016 has come and gone and what an event it was! This ...

3 Min Read
USENIX LISA16 Visitors Guide to Boston

The Threat Stack Team

November 7, 2016

If you’re heading to this year’s upcoming USENIX LISA Conference — welcome to Boston! Threat Stack is a proud sponsor of the conference, and ...

4 Min Read
The How vs the Who: An Argument Against Attribution & Hack Back

Sam Bisbee

November 2, 2016

A lot of organizations focus their efforts on identifying external actors, distinguishing between different groups that may be attempting malicious ...

5 Min Read
Will SecOps Finally Close the Security and Operations Gap? A Q&A with Pete Cheslock

Pete Cheslock

October 27, 2016

At Threat Stack, we’ve been a SecOps-oriented team from day one. This means our developers, operations, and security practitioners all work ...

3 Min Read
A Look Back at AppSecUSA: From Application Security to DevOps and Beyond

Tim Armstrong

October 18, 2016

Last week I spent two fantastic days in Washington, DC attending the AppSecUSA Conference on behalf of Threat Stack, one of the event’s Silver ...

3 Min Read
Myth Busting 3 Objections to Buying Cloud Security Solutions!

Jim McDonough

October 14, 2016

I was sitting with my Sales Team last Friday, listening to their experiences with prospects. They had some great stories about wins and interesting ...

2 Min Read
Building Strong Partnerships: Why We’re a Proud Sponsor of the PagerDuty Summit

Threat Stack Marketing Team

September 20, 2016

After the Threat Stack team attended last week’s PagerDuty Summit in San Francisco, it became clear why PagerDuty is the market leader in agile ...

4 Min Read
DevOpsDays Chicago 2016: Dev, Ops, & the Role of Security

Tom McLaughlin

September 9, 2016

Last week I spent two great days at DevOpsDays Chicago. Usually, I attend conferences to listen to the talks, but in Chicago I was representing ...

6 Min Read
ShadowOps is Not Just Bad DevOps

Apollo Catlin

August 30, 2016

Some alarmists or buzzword-feeders like to say “DevOps is dead.” But this statement either betrays a grossly inaccurate understanding, or it’s ...

3 Min Read
3 Lessons Learned From AWS NYC Summit

Threat Stack Marketing Team

August 16, 2016

"I remember when there were only about 40 of us meeting here, talking about AWS, and ending the day by descending on the hotel bar." — Told to us ...

4 Min Read
Pokémon GO & Security: Who are All These Strange People in the Lobby?

Tom McLaughlin

July 12, 2016

Just in case you were wondering, the @nytimes building is a Pokegym. — Runa A. Sandvik (@runasand) ...

3 Min Read
Monitorama 2016: Monitoring Tools and the People Who Use Them

Apollo Catlin

June 30, 2016

If I learned one thing at Monitorama 2016 in Portland, Oregon, it’s this: it has never been easier to monitor your infrastructure. Not only have ...

3 Min Read
Customer Success Management — in the Cloud!

Devin Behenna

June 28, 2016

Customer Success Management (CSM) is becoming one of the most important practices for driving customer success throughout the SaaS B2B sector. ...

4 Min Read
How to Become a Great Business Development Representative

Mimi Alperovich

June 6, 2016

About a week ago I started a fantastic new role as Director of Sales Prospecting & Business Development at the Boston-based Cloud Security ...

6 Min Read
Why Did We Need to Invent DevSecOps?

Tom McLaughlin

June 1, 2016

While the term "DevSecOps" has started to come up more often recently, we’re still wrapping our heads around “DevOps” to answer questions such ...