Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

4 Min Read
Best Practices for User Access Management

Christian Lappin

August 9, 2018

Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In ...

13 Min Read
What Would You Change About AWS Security?

Pete Cheslock

August 8, 2018

20 Security Pros Reveal the One Thing They'd Change About AWS Security AWS is one of the most popular cloud platforms among enterprises and even ...

18 Min Read
50 Best Cloud Security Training Resources

Bob Allin

August 2, 2018

The bad news is there’s a global shortage of trained cybersecurity professionals: According to PWC, there will be 1.5 million cybersecurity job ...

3 Min Read
What is the NIST Cybersecurity Framework?

Lindsey Ullian

July 31, 2018

You’ve SOC 2-ed from here to eternity, and you’ve got GDPR in the bag, but if you’re truly focused on security maturity, you know that your ...

3 Min Read
Why Kubernetes is Not a Silver Bullet

Todd Morneau

July 26, 2018

Container adoption is on a meteoric rise. Gartner estimates that 50 percent of companies will use container technology by 2020, up from less than 20 ...

3 Min Read
How to Avoid Targeted AWS Attacks With Secure AWS Keys

Pat Cable

July 25, 2018

If the headlines are any indication, hackers continue to exploit vulnerabilities in cloud infrastructure platforms, with targeted AWS attacks ...

4 Min Read
Why DevOps Needs Security During an Infrastructure Transition

Pan Chhum

July 24, 2018

The rising popularity of DevOps practices in cloud infrastructure environments has allowed software teams to release work more quickly and ...

3 Min Read
How to Use Threat Stack to Enable Proactive Security

Christian Lappin

July 20, 2018

We recently discussed some pretty sobering statistics in the world of cybersecurity, ranging from astronomical misconfiguration rates to the ...

10 Min Read
101 AWS Security Tips & Quotes, Part 4: Best AWS Security Practices

Bob Allin

July 11, 2018

The fourth — and final — blog post in our series of AWS Security Tips and Quotes offers tips on AWS Security Best Practices. So far the series ...

3 Min Read
Access Management Lessons From Timehop’s Cloud Security Breach

Pat Cable

July 10, 2018

Over the past couple of weeks, both Macy's and Timehop experienced breaches as a result of authentication weaknesses. On July 4, social media startup ...

3 Min Read
Three Homegrown SecOps Tools Used by the Threat Stack Team

Pat Cable

July 9, 2018

As a security company, there’s a lot of pressure to keep our data secure while still moving fast and innovating on product development. I find the ...

10 Min Read
101 AWS Security Tips & Quotes, Part 3: Best Practices for Using Security Groups in AWS

Bob Allin

July 3, 2018

Here’s the third blog post in our 4-part series of AWS Security Tips and Quotes, which is designed to help you evolve and strengthen your ...

5 Min Read
What is SecOps? A Definition, Benefits, Best Practices, and More

Pan Chhum

June 27, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and ...

11 Min Read
101 AWS Security Tips & Quotes, Part 2: Securing Your AWS Environment

Hank Schless

June 26, 2018

As part of its mission, Threat Stack has always brought its readers security-related content to help them make informed decisions that will ...

3 Min Read
Visualizing Detection & Remediation in the Cloud With Graylog — Webinar Recap

Sarah Wills

June 25, 2018

If you’re on a Security team, chances are you may be able to leverage some of the Operations team’s existing tools for log management and SIEM. ...

3 Min Read
3 Things to Know About Kubernetes Security

Todd Morneau

June 22, 2018

Gartner estimates that 50 percent of companies will use container technology by 2020, up from less than 20 percent in 2017. The operational benefits ...

12 Min Read
101 AWS Security Tips & Quotes, Part 1: Essential Security Practices

Hannah Klemme

June 21, 2018

With more companies than ever leveraging cloud services like AWS, and with cloud environments becoming more and more complex, it’s imperative that ...

3 Min Read
Why an Infrastructure Transition is the Perfect Time to Invest in Security

Todd Morneau

June 20, 2018

You’re in the midst of an infrastructure transition, and you have a million and one things on your plate. Whether you are deploying containers for ...

4 Min Read
5 Statistics That Prove Why Your Security Posture Can’t Be Purely Reactive

Hank Schless

June 19, 2018

While reacting to alerts and incidents after they occur will always be a reality of the security professional’s job, a purely reactive security ...

4 Min Read
How to Use Threat Stack to Reduce Mean Time To Know

Hank Schless

June 15, 2018

Mean Time To Detect (MTTD) and Mean Time To Know (MTTK) are two of the most important metrics in security operations. Respectively, they measure the ...

4 Min Read
What is AWS PCI Compliance?

Lindsey Ullian

June 12, 2018

A Definition of AWS PCI Compliance, Benefits, Requirements, & More If your organization processes credit or debit card payments, PCI compliance ...