Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

5 Min Read
How to Identify Threats Within Your Docker Containers

Nathan Cooprider

February 19, 2019

Now is a good time to review Threat Stack’s Docker integration in the wake of the recent runc CVE. The headline reporting gets a little hyperbolic, ...

3 Min Read
The Difference Between Security Trick Plays and Security Fundamentals

Nathan Cooprider

February 14, 2019

I like watching great football plays on YouTube, but I especially like watching trick plays where players sell some sort of deception so their ...

2 Min Read
How to Defend Against the runC Container Vulnerability

Nathan Paulhus

February 13, 2019

Earlier this week security researchers Adam Iwaniuk and Borys Poplawski published details on a vulnerability in runC, the underlying container ...

5 Min Read
Transforming Alert Fatigue Into Proactive Security Management

John Shoenberger

February 12, 2019

In a recent study, 72% of CISOs stated that their teams are facing alert fatigue, while 82% of respondents to a Threat Stack survey indicated that ...

6 Min Read
Machine Learning, Signatures, Rules, & Behaviors — Tips on Navigating Modern Cloud Security Solutions

Mark Moore

February 6, 2019

Cloud security is one of the most rapidly changing technology landscapes out there. And naturally, the market for security tools is also constantly ...

16 Min Read
21 Developers & Docker Experts Reveal the Biggest Mistakes People Make When Switching to Docker Containers

John Shoenberger

February 6, 2019

Containerized environments are increasingly popular, and Docker remains the most popular container solution for developers. But the process of moving ...

3 Min Read
Leveraging Threat Stack’s Out-of-the-Box Rulesets and Single View for Managing Multiple AWS Accounts

Stephen Fitzgerald

January 30, 2019

Increasingly, AWS users are leveraging multiple accounts to manage their infrastructure. While doing so is a recommended best practice that enables ...

22 Min Read
50+ Best Cloud and Cloud Security Certifications

Alan Nakashian-Holsberg

January 25, 2019

The growth of cloud technology has been phenomenal over the past few years, and it doesn’t show any signs of stopping. Companies of all sizes ...

3 Min Read
AWS Security Readiness Checklist

Mark Moore

January 16, 2019

This AWS Security Readiness Checklist is intended to help organizations evaluate their applications and systems before deployment on AWS. This ...

23 Min Read
50 Great DevOps Tools You May Not Be Using

Mark Moore

January 11, 2019

DevOps is about seamless collaboration between Development and Operations, and you need to have the right tools in your environment to help make this ...

4 Min Read
Kubernetes Security Tips & Best Practices

John Shoenberger

January 8, 2019

Recently, there has been a significant upswing in the adoption of containerized environments. In light of this, we’ve written a number of posts ...

20 Min Read
The Best Cloud Security Conferences to Attend in 2019

Sarah Wills

January 4, 2019

For the latest info — take a look at Sarah Wills’ Best Cloud Security Conferences to Attend in 2020. Securing any cloud infrastructure is ...

4 Min Read
Docker Security Tips & Best Practices

John Shoenberger

January 3, 2019

Docker is a software platform that makes it easier to create, deploy, and run applications. Recently there has been a major surge in the adoption ...

3 Min Read
Threat Stack Continues 2018’s Momentum Into 2019

Brian Ahern

January 2, 2019

As we enter the first days of 2019, it’s a great time to look back at the tremendous momentum we built up at Threat Stack over the last year. We ...

19 Min Read
20 Developers and Kubernetes Experts Reveal the Biggest Mistakes People Make During the Transition to Kubernetes

Mike Broberg

December 20, 2018

Making the transition from virtual machines to containers is a complex process that can take some time, particularly for larger, more complex ...

5 Min Read
AWS Security Groups: What They Are and How to Get the Most Out of Them

John Shoenberger

December 19, 2018

AWS Security Groups are a flexible tool to help you secure your Amazon EC2 instances. AWS Security Groups are just one of several tools AWS offers to ...

5 Min Read
What is Cloud Workload Security?

Stephen Fitzgerald

December 14, 2018

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...

2 Min Read
Threat Stack Introduces Bulk Data Export Feature

Ivan Evsyukov

December 13, 2018

One of the biggest benefits of the Threat Stack Cloud Security Platform® is the deep level of visibility we bring to observing operator behaviors in ...

5 Min Read
9 Core & Specialty AWS Security Certifications

Alan Nakashian-Holsberg

December 11, 2018

For an updated discussion of these certifications and others, see Alan Nakashian-Holsberg's 9 AWS Security Certifications to Consider in ...

4 Min Read
Threat Stack Announces New and Enhanced CloudTrail Rules

Nathan Paulhus

December 10, 2018

As AWS continues to expand its services landscape, Threat Stack has made a commitment to keeping in step by crafting additional coverage that keeps ...

6 Min Read
Detecting Unsafe Data Deserialization With Threat Stack

Aakash Prasad

December 6, 2018

UPDATED — January 22, 2019 The Threat Stack SOC is aware of the recent disclosure of a breach of the PHP Extension and Application Repository ...