Strong security is vital to any SaaS company, enabling platform stability and integrity while instilling confidence in potential customers.
There’s nothing new in this statement, but, with an eye on the bottom line, C-Level executives, board members, and VC firms often take a little more convincing when it comes to implementing new cloud security strategies — especially if it means shelling out cash for new solutions or team members. Obtaining buy-in for new security initiatives can be a time-consuming task requiring several layers of validation.
There’s a very real risk of security initiatives losing out to more obvious business drivers when it comes time for budget allocation. But as an IT or security team lead, it’s your job to advocate for security priorities. In this post, we’ll outline the steps you can take to get the green light you need for your cloud security strategy. Read more “How to Obtain Buy-in on Security Initiatives for Your SaaS Company”
The other week we outlined a number of resolutions to put you on the path to a cyber-secure 2018. In this post we’re going to direct you to some of the resources we produced in 2017 that will help you carry out those resolutions.
2017 was an eventful year in the cybersecurity world — to say the least! It seems that every day a new threat or major breach was causing a stir — whether it was Equifax, the RNC voter data exposure, WannaCry, Uber, Alteryx, or — to start the new year — Spectre and Meltdown!
If you want to take a look at the World’s Worst Data Breaches, here you go. But we’re going to stick to our preferred approach: After you read the splashy headlines, look inward to make sure your own data and systems are secure. To help you secure and manage your cloud environments, we’ve put together a summary of a few of the great resources we produced in 2017. Read more “Resources to Help You Carry Out Your 2018 Security Resolutions”
So, you’ve finally gotten the cloud security conversation started at your organization, have a rough budget set aside, and your team is eager to get started. Now what? If you’re new to the world of security, have never managed security in the cloud before, or simply need some guardrails to help you get started, this post will break down everything you need to know.
Below are five sequenced steps to take when embarking on a new cloud security journey. Follow them and you’ll be on the path to strengthening your organization’s cloud security posture. Read more “Your Personal Guide to Cloud Security 101”
Every organization is unique in the way it functions and the role each team member plays. So when it comes to security, the very first thing you need to do before kicking off a program or updating your strategy is to decide how security will be driven in your organization and how decisions will be made. While this may be managed formally in larger organizations, smaller companies that don’t have a dedicated security team need to structure their approach to security to ensure that they can create effective security coverage using their more limited resources.
With that in mind, here are four recommendations for getting started with a security program in your organization. Read more “Getting Started With Security? Here’s the Very First Thing to Do”
The global shortage of cybersecurity talent shows no signs of abating, making it harder than ever for smaller businesses to compete for qualified talent. But even if prospects were available and even if you had unlimited budget, throwing resources at the problem would not be the best way to address your security challenges. Instead, we recommend coordinating your limited resources and rethinking security as a shared mission for the entire organization rather than a discrete department.
If you’re facing limited resources and security talent, you can still run secure by following best practices for getting the most out of what you do have. Here are four or our recommendations for running lean in the cloud. Read more “Doing More With Less: 4 Ways to Run a Successful, Lean Security Team”
Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support
Instead of the “predictions” that are usually offered up at this time of year, we decided to focus on security resolutions. So rather than surveying a variety of issues that might (or might not) affect your security operations in the coming year, we want to talk about resolutions that, if you put them into play and follow through rigorously, will offer a sure way of strengthening your organization’s security habits and posture.
Security should never be thought of as a one-and-done proposition. It’s an ongoing, evolving process, and instead of “getting secure,” smart organizations focus on continuously improving their security postures. As with any other type of improvements you want to make, it can be helpful to take a moment to pause and consider your goals for the coming year. Instead of good intentions that don’t translate into action, make resolutions around the reality of today’s security landscape and the very real challenges that are likely to arise in your organization in 2018.
To help you do this, we sat down with two of our cloud security experts, Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support, to ask them what resolutions they recommend companies make regarding security in 2018. Here’s what they had to say. Read more “Threat Stack’s 2018 New Year’s Security Resolutions”
Security is critical to any business operating in the cloud — in fact, it needs to be a top business priority for the reasons outlined below — and its importance leads many companies to serious conversations about it as early as Day One of operations (if not while the company is still in the planning stages).
If you’re not proactively building out a security program from the earliest days, your turning point could come after a security breach.
But why live under the threat of an incident or put off implementing security measures until something bad happens? It’s much wiser to take a proactive approach to reduce your organization’s risk — and, as we point out below — to reap the other operational and business benefits that are directly connected to good cloud security.
Whatever motivates you to start a security program, the question is “How can you get the initial conversation started in a way that fosters an understanding of the real value of cloud security and wins you the support your project will need to carry it from a concept to an ongoing program?”
The good news is there are best practices that can help your program gets traction. In this post, we explore four that will help you successfully prepare for and manage the initial security conversation at your company. Read more “How to Get The Security Conversation Started at Your Organization”
Today’s marketplace is cluttered with solutions to an extensive array of security risks, from data loss to malware. However, when building your own security arsenal — especially if you are running lean — it’s essential to take a step back and think holistically about what you actually need, rather than to buy products willy nilly and end up with a pile of single-use tools that don’t integrate well.
Below are four recommendations to help you get what you actually need when it comes to cloud security tools, no matter your budget or team size. Read more “Lean Guidelines for Selecting and Managing Cloud Security Solutions”
Every organization orchestrates their infrastructure in their own way, but more often than not, most cloud environments have a lot in common. Since infrastructure security is embedded at the technology layer of your stack, many security tools on the market today can meet the needs of even the most unique cloud configurations. In this post, we’ll explain why that is. Read more “Is Your Infrastructure Too Unique for a Cloud Security Tool?”
On December 14, Chris Gervais, Threat Stack’s VP of Engineering, was joined by Sabino Marquez, the CISO of Allocadia for our latest webinar: Lean Security: Your Guide to SecOps Efficiency in the Cloud. We’ve written before about lean security and the importance of aligning people, processes, and technology to create a successful security organization. In this webinar, we learned first-hand how Allocadia does it with Threat Stack.
You can view the entire webinar here, or read a recap of the key points that Chris and Sabino covered. Read more “Lean Security Webinar ReCap: Achieving SecOps Efficiency in the Cloud”