Latest Blogs About "Cloud Security"

194 total posts.

7 Min Read
Scaling Anomaly Detection Pipelines For Security Telemetry

Mina Botros

April 15, 2021

This blog post is co-authored by Senior Software Engineer Mina Botros, Principal Data Scientist Dimitry Kit, and Senior Software Engineer, Platform ...

7 Min Read
Why Alerts per Day is a Misleading Metric for Security Teams

Sam Bisbee

January 12, 2021

Over the last six and a half years we have worked with thousands of companies of all sizes and maturities on implementing threat detection for their ...

3 Min Read
Five Cloud Security Myths

Rob Young

January 7, 2021

The pandemic will have a lasting, long-term effect on IT, and one of the most important will be even faster migration to the cloud, according to ...

3 Min Read
An Open Letter to Security Vendors’ Predatory Use of Public Breaches

Sam Bisbee

December 11, 2020

Disclaimer: This post discusses a breach that is reportedly under active investigation. I have not spoken with the FireEye team about this incident, ...

4 Min Read
Establishing a 2021 Cloud Security Strategy

Rob Young

November 17, 2020

In early 2020, organizations were already moving quickly towards the cloud before the COVID-19 pandemic put their journey into fifth gear. How fast ...

6 Min Read
40 Essential Cloud Security Blogs for IT Professionals

Jackson Connell

July 9, 2020

As the rapid adoption of new ephemeral cloud deployment options, like containers and kubernetes, gives DevOps teams more flexibility, it is more ...

6 Min Read
The Curious Case of the Sunday Morning Alarm: Debugging Disk Performance in the Cloud

Pat Cable

June 9, 2020

Threat Stack has an event processing pipeline that processes millions of messages per second sent to us by customer agents, our internal services, ...

2 Min Read
Go Behind the Scenes of a Docker Cryptojacking Attack

Robin Stone

April 10, 2019

When Threat Stack security analyst Ethan Hansen saw an alert in a customer’s environment that read /temp [RANDOM] cnrig, he knew his afternoon was ...

2 Min Read
How to Defend Against the runC Container Vulnerability

Nathan Paulhus

February 13, 2019

Earlier this week security researchers Adam Iwaniuk and Borys Poplawski published details on a vulnerability in runC, the underlying container ...

5 Min Read
What is Cloud Workload Security?

Stephen Fitzgerald

December 14, 2018

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...

3 Min Read
How to Cope With the Security Talent Shortage in SecOps

Mark Moore

October 18, 2018

Security budgets are rising, but are they helping with challenges caused by the security talent shortage? This post offers insights from our recent ...

17 Min Read
50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts

Bob Allin

June 1, 2018

With revenue from the cloud computing sector expected to hit $411 billion by 2020, it's no wonder that more and more companies are shifting their ...

3 Min Read
3 Security Best Practices We Used to Build a Strong Foundation at Threat Stack

Pete Cheslock

April 26, 2018

As a security company, Threat Stack prioritized the implementation of security best practices from day one. To share our experience, this post ...

2 Min Read
Destiny is Defined by the Journey: Acquired by Palo Alto Networks

Brian Ahern

March 15, 2018

Congratulations to on having your cloud story acquired by Palo Alto Networks. Your vision, passion, and commitment have been rightly ...

6 Min Read
How to Answer Tough Board-Level Security & Compliance Questions in 2018

Bob Allin

January 31, 2018

GDPR. Meltdown. Spectre. SOC 2. Coming at you like mosquitos on a hot summer night, these topics are of top concern for board members and security ...

5 Min Read
Resources to Help You Carry Out Your 2018 Security Resolutions

Threat Stack Marketing Team

January 15, 2018

The other week we outlined a number of resolutions to put you on the path to a cyber-secure 2018. In this post we’re going to direct you to some of ...

4 Min Read
Threat Stack’s 2018 New Year’s Security Resolutions

Threat Stack Product Team

January 3, 2018

Insights from Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support Instead of the “predictions” that are ...

3 Min Read
Is Your Infrastructure Too Unique for a Cloud Security Tool?

Anthony Alves

December 19, 2017

Every organization orchestrates their infrastructure in their own way, but more often than not, most cloud environments have a lot in common. Since ...

3 Min Read
How to Work Backwards to Develop a Sound Security Strategy

Anthony Alves

December 12, 2017

In today’s cloud-based environments, security threats can move faster and do more damage than ever before. To avoid a financial and technological ...

3 Min Read
Velocity and Security: 5 Posts to Help You Get Security Up to Speed

Pat Cable

November 30, 2017

There’s a lot of talk in the business world — especially the software-driven side of it — about achieving and maintaining velocity. The ability ...

4 Min Read
Enhancing the Power of Your SIEM With Threat Stack’s Intrusion Detection Platform

Christian Lappin

November 29, 2017

Trying to manage security with only one security tool (or, for example, having to use log files alone) can be a major headache. The right ...