Latest Blogs About "Cloud Security"

195 total posts.

2 Min Read
Go Behind the Scenes of a Docker Cryptojacking Attack

Robin Stone

April 10, 2019

When Threat Stack security analyst Ethan Hansen saw an alert in a customer’s environment that read /temp [RANDOM] cnrig, he knew his afternoon was ...

2 Min Read
How to Defend Against the runC Container Vulnerability

Nathan Paulhus

February 13, 2019

Earlier this week security researchers Adam Iwaniuk and Borys Poplawski published details on a vulnerability in runC, the underlying container ...

5 Min Read
What is Cloud Workload Security?

Stephen Fitzgerald

December 14, 2018

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...

3 Min Read
How to Cope With the Security Talent Shortage in SecOps

Mark Moore

October 18, 2018

Security budgets are rising, but are they helping with challenges caused by the security talent shortage? This post offers insights from our recent ...

17 Min Read
50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts

Bob Allin

June 1, 2018

With revenue from the cloud computing sector expected to hit $411 billion by 2020, it's no wonder that more and more companies are shifting their ...

3 Min Read
3 Security Best Practices We Used to Build a Strong Foundation at Threat Stack

Pete Cheslock

April 26, 2018

As a security company, Threat Stack prioritized the implementation of security best practices from day one. To share our experience, this post ...

2 Min Read
Destiny is Defined by the Journey: Evident.io Acquired by Palo Alto Networks

Brian Ahern

March 15, 2018

Congratulations to Evident.io on having your cloud story acquired by Palo Alto Networks. Your vision, passion, and commitment have been rightly ...

6 Min Read
How to Answer Tough Board-Level Security & Compliance Questions in 2018

Bob Allin

January 31, 2018

GDPR. Meltdown. Spectre. SOC 2. Coming at you like mosquitos on a hot summer night, these topics are of top concern for board members and security ...

5 Min Read
Resources to Help You Carry Out Your 2018 Security Resolutions

Threat Stack Marketing Team

January 15, 2018

The other week we outlined a number of resolutions to put you on the path to a cyber-secure 2018. In this post we’re going to direct you to some of ...

4 Min Read
Threat Stack’s 2018 New Year’s Security Resolutions

Threat Stack Product Team

January 3, 2018

Insights from Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support Instead of the “predictions” that are ...

3 Min Read
Is Your Infrastructure Too Unique for a Cloud Security Tool?

Anthony Alves

December 19, 2017

Every organization orchestrates their infrastructure in their own way, but more often than not, most cloud environments have a lot in common. Since ...

3 Min Read
How to Work Backwards to Develop a Sound Security Strategy

Anthony Alves

December 12, 2017

In today’s cloud-based environments, security threats can move faster and do more damage than ever before. To avoid a financial and technological ...

4 Min Read
People, Processes, & Technology: The 3 Elements of a Rockstar Security Organization

Christian Lappin

December 1, 2017

In our recent webinar, Automating Security & Compliance for Your Cloud Deployment, we explored ways that firms can scale their cloud security ...

3 Min Read
Velocity and Security: 5 Posts to Help You Get Security Up to Speed

Pat Cable

November 30, 2017

There’s a lot of talk in the business world — especially the software-driven side of it — about achieving and maintaining velocity. The ability ...

4 Min Read
Enhancing the Power of Your SIEM With Threat Stack’s Intrusion Detection Platform

Christian Lappin

November 29, 2017

Trying to manage security with only one security tool (or, for example, having to use log files alone) can be a major headache. The right ...

3 Min Read
The 7 Key Functions of a Modern Intrusion Detection Platform

Christian Lappin

November 21, 2017

When you’re making a mental shift away from legacy, on-prem security thinking, you may be wondering what an effective, modern security solution ...

4 Min Read
How to Secure a Non-Production Environment (Webinar Recap)

Michal Ferguson

November 10, 2017

“This code is fine, right?” “It should be...” “Wait... but what about this configuration?” “Fine, I’ll test it in dev...” This ...

3 Min Read
What Makes a Misconfiguration Critical? AWS Security Tips

Josh Trota

November 6, 2017

In the cloud, where there are no perimeters and limitless endpoints, there are many ways attackers can get direct access to your environment if you ...

3 Min Read
This may be the scariest thing you read today . . .

Threat Stack Marketing Team

October 31, 2017

A couple of weeks ago, we posted a survey so people could evaluate their cybersecurity savvy. And the results are . . . Well, let’s just say that ...

4 Min Read
Hybrid Security: How to Protect a Complex Environment

Natalie Walsh

October 30, 2017

It is very clear by now that the cloud has reached an inflection point. Public cloud investment continues its rapid expansion, driven in large part ...

3 Min Read
What’s Driving Cloud Security Investment Today? Learnings From Our Survey

Travis Wilkins

October 27, 2017

Public cloud investment is expanding rapidly in 2017, with Gartner projecting 18% growth over the course of this year, including 36.8% growth for the ...