Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

6 Min Read
Tips on Recruiting Top Talent in the Current DevOps and Cloud Security Markets

Shaun Kelly

June 6, 2019

Q&A With Michael Race, Senior Consultant in Cloud/Infrastructure Security and DevSecOps at Stott and May Hiring and retaining talent in ...

4 Min Read
AWS GDPR: What You Need to Know

Stephen Fitzgerald

June 4, 2019

In May 2018, the General Data Protection Regulation became enforceable. While it is largely a European Union regulation, you are still covered by it ...

10 Min Read
Current Trends in Automated Software Testing

Laura Haiduck

May 30, 2019

10 Testing Pros Share Insights Into the Most Interesting Current Trends in Automated Software Testing Whether you're just getting started in ...

4 Min Read
Defining the “Full Stack” in Full Stack Security Observability

Tim Buntel

May 23, 2019

Here at Threat Stack, we’ve been talking a lot about security observability recently (check out this article and whitepaper). When you design and ...

8 Min Read
20 Best Continuous Integration Tools: A Guide to Optimizing Your CI/CD Processes

Ben Patterson

May 22, 2019

Continuous integration (CI) tools are the engine that drives today's SaaS software development strategy across all business, corporate, consumer, and ...

6 Min Read
Data Privacy is in the Spotlight as Colorado Enacts Landmark Consumer Data Privacy Bill (PCDP)

Kevin Kish

May 21, 2019

Introduction — by Lindsey Ullian, Threat Stack Compliance Manager Colorado has rightfully gained a reputation as one of the most socially ...

3 Min Read
How to Defend Against ZombieLoad

Mike Broberg

May 17, 2019

Earlier this week a group of security researchers from Graz University of Technology, imec-DistriNet, KU Leuven, Worcester Polytechnic Institute, and ...

2 Min Read
A Threat Stack SOC Analysis: The Continuing Evolution of the Shellbot Cryptomining Malware

Ethan Hansen

May 15, 2019

Update: Threat Stack Presents Threat Briefing On New Cryptomining Shellbot Malware Variant Available: On demand About This Threat ...

5 Min Read
Cloud Security Observability: How to Reduce Risk in Your Cloud-Native Infrastructure

Natalie Walsh

May 7, 2019

Security Observability has become an important concept recently as companies have started building software with a cloud-native mindset, embracing ...

4 Min Read
Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take

Tim Buntel

May 2, 2019

Modern healthcare is a full participant in the digital economy, and personal health information (PHI) is at its center. But today’s digital ...

4 Min Read
AWS HIPAA Compliance Best Practices Checklist

Mark Moore

April 25, 2019

The Health Insurance Portability and Accountability Act, or HIPAA, is a United States law that seeks to protect the privacy of patients’ medical ...

17 Min Read
50 Best Kubernetes Architecture Tutorials

Natalie Walsh

April 18, 2019

Kubernetes is a multi-functional, container-centric platform for managing workloads and services. Given the fact that containers and container ...

2 Min Read
Go Behind the Scenes of a Docker Cryptojacking Attack

Robin Stone

April 10, 2019

When Threat Stack security analyst Ethan Hansen saw an alert in a customer’s environment that read /temp [RANDOM] cnrig, he knew his afternoon was ...

7 Min Read
Operation Code and Sam Bisbee Talk About Getting Started in Security

Kevin Flike

March 28, 2019

In February 2019, Threat Stack hosted a meetup with the Boston chapter of Operation Code. Operation Code is a 501(c)(3) non-profit intensely focused ...

7 Min Read
If You’re Not First, You’re Last: Risks of Delaying CCPA Compliance

Kevin Kish

March 26, 2019

Introduction — by Lindsey Ullian, Threat Stack Compliance Manager After GDPR went into effect in May 2018, many companies reassessed their ...

5 Min Read
7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

Todd Morneau

March 21, 2019

The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same can complicate the ...

3 Min Read
Container Security Tips and Best Practices

Miguel De Los Santos

March 19, 2019

Containers provide very important functionality: They package various software applications in “containers” to ensure that they are able to run ...

6 Min Read
How to Achieve Full Stack, Multi-Cloud Security Observability

Christopher Ford

March 14, 2019

You probably know AWS as the leading cloud platform provider. These days, however, many companies are using additional cloud providers as well. ...

6 Min Read
How to Track Agent-Based User Activity

Ethan Hansen

March 12, 2019

More often than not we'll need to go beyond a Severity 1 alert to figure out what a user (including a potentially malicious attacker) was doing on a ...

6 Min Read
How to Understand Your Attacker’s Mindset

Aakash Prasad

March 7, 2019

In this post we’ll try to develop an understanding of a typical attacker’s mindset and then show you how companies like yours can use this ...

2 Min Read
The Economic Impact of Threat Stack – A Forrester Research Study

Natalie Walsh

March 6, 2019

Cost Savings and Business Benefits Enabled by Threat Stack When investing in cloud security platforms and services, businesses naturally want to ...