Live Webinar | Thursday, December 14 | 1:00 p.m. EST | 10:00 a.m. PST |
About This Webinar
You’re a security professional (or maybe you’re not, but sometimes you get asked to be one). You don’t have enough people, enough budget, or enough time. But you know that’s not an acceptable reason for ignoring security now that we are all running fast in the cloud. Read more “Webinar: Lean Cloud Security: Your Guide to SecOps Efficiency in the Cloud”
In today’s cloud-based environments, security threats can move faster and do more damage than ever before. To avoid a financial and technological repercussions, companies must be proactive with their security strategies and have the ability to act fast.
A common approach is to “over-secure” company systems, but this can unnecessarily limit employee access to important tools and hinder productivity. Alternatively, those who know security well realize that if you offer employees too much access, it can open your business to security vulnerabilities.
A better approach centers on striking the right balance between security and practicality, and the way companies can achieve this is by working backwards from the ideal security scenario to formulate their strategy.
In this post, we’ll explore ways that security leaders can approach technology in a manner that is both usable for employees but also secure for the company. To do this, they must begin with an analysis of the risks and the needs of their employees. Let’s dive in. Read more “How to Work Backwards to Develop a Sound Security Strategy”
It’s an issue that most security teams struggle with, but not many have a good solution. When there’s an ample supply, security is strong, but when insufficient, it puts a strain on the entire organization. We’re talking about people.
As companies grow, security becomes more and more important, but what if you don’t have enough people to fill the seats? It’s no secret we’re facing a talent shortage of epidemic proportions. According to PWC, there will be 1.5 million cyber security job openings by 2019, and the talent market is not expected to catch up any time soon. But this does not mean companies can simply put off security until the talent market catches up (because by all estimates, they’ll be waiting a long time). So how can companies solve for this? Consider the following three key approaches: Read more “The Biggest Issue Security Teams Have Today (And 3 Ways to Solve It)”
It’s difficult to quantify the money saved by preventing a cyber attack that never happened. This is why proving the ROI of security measures can be tricky and can sometimes make security feel more like a cost-center than an investment.
In truth, being a great security organization is a competitive advantage. It’s both a sales driver and a compliance linchpin. It’s not simply a cost of doing business. In fact, it can really give you a leg up, particularly when selling to customers with HIPAA, SOC 2, ISO27000, or other compliance requirements.
In this post, we’ll explore a number of ways to balance risk and reward as you pursue cloud security and ensure the vitality of your business. Read more “How to Balance Risk and Reward When it Comes to Cloud Security”
Shadow IT has emerged in recent years due to misaligned objectives among teams and the fluid nature of DevOps. We’ve written before that although it may achieve short-term goals for the business units it serves, Shadow IT is detrimental for the long-term stability of organizations, and despite its good intentions, puts companies at greater security risk.
In this post, we’ll explore how development, security, and operations can work together to prevent the need for Shadow IT. Read more “The Hidden Dangers of Shadow IT to Cloud Security”
In our recent webinar, Automating Security & Compliance for Your Cloud Deployment, we explored ways that firms can scale their cloud security strategies through visibility and intrusion detection, security and compliance automation, and low-cost security practices.
Some organizations are especially successful when it comes to security preparedness. In the webinar, we discussed what makes the strongest teams stand out. It boils down to their unique approaches to people, processes, and technology and how theses elements are bound together by a common set of goals.
In this post, we’ll dig further into these three areas and define what you really need to create a rockstar security organization. Read more “People, Processes, & Technology: The 3 Elements of a Rockstar Security Organization”
There’s a lot of talk in the business world — especially the software-driven side of it — about achieving and maintaining velocity. The ability to continuously release new code can be the difference between winning and losing.
But as Threat Stack’s CSO, Sam Bisbee, recently pointed out in InfoSecurity magazine, “The market’s investment in services and tools to automate business processes without incurring heavy maintenance costs has outpaced investment in the methods to secure them.” Sometimes we forget that, if security can’t keep up, it won’t matter how fast you get that new app out there. You’ll eventually be faced with a mountain of security-related headaches — or at least the stress of increased risk. Read more “Velocity and Security: 5 Posts to Help You Get Security Up to Speed”
Las Vegas — Wednesday, November 29, 2017
It was 8:00 a.m. when AWS CEO Andy Jassy took to the stage to offer up the latest AWS news and announcements. And offer up he did. To my recollection, the number of services announced today dwarfed anything unveiled at any previous AWS re:Invent show. (To see the ever-growing list of services debuted this year, head over to the AWS blog.)
The sheer number of new services blew away all expectations. Not only did Amazon announce new compute instances and enhancements to some of their existing services, but the big news was their flurry of announcements about new services that continue down the path of Serverless and Machine Learning.
Here are some of the highlights, along with my points of view from a DevOps perspective. Read more “Andy Jassy, CEO of Amazon Web Services, Introduces New and Enhanced AWS Services at re:Invent”
Trying to manage security with only one security tool (or, for example, having to use log files alone) can be a major headache. The right combination, however — like a SIEM coupled with an intrusion detection platform — can produce great results, including better data, smaller amounts of data, shorter processing times, and lower operating costs. Read more “Enhancing the Power of Your SIEM With Threat Stack’s Intrusion Detection Platform”
Las Vegas — Tuesday, November 28, 2017
I’m out in Las Vegas at the AWS re:Invent conference, and it is definitely the best re:Invent I’ve ever attended. Like everything in Vegas, it is larger than life! Read more “Live From AWS re:Invent 2017 — Massive Scale in Real Life”