A lot has happened in the world of DevOps and Security this week. Here are the top posts we saw around the community:
Great applied technology typically needs enabling partner technology, and it will struggle to make headway until that partner appears. For decades, Intrusion Detection System (IDS) technology struggled to deliver efficient, high quality intrusion monitoring, and is only now experiencing success with the arrival of an unintentional enabling partner technology – cloud computing.
A developer or operator leaving your company is always a harrowing event. More than likely they had access to your production environment, so you engage your standardized process for revoking their access. But how can you be sure everything is truly cleaned up, regardless of whether you suspect they would be malicious or not?
At Threat Stack, most of our customers are primarily cloud-based and are just getting started with security. Very often, they ask about solutions like “threat intelligence” or Network Intrusion Detection Systems (NIDS). Whereas one is overly complex (threat intelligence), the other (NIDS) has limited value in cloud environments.
Read more “Hierarchy of Cloud Security Needs”