Many organizations have limited resources (time, personnel, and money) for IT, and oftentimes only a small portion of that is devoted to security. Given the limited resources available to create and execute a best practice security plan, you will need to face up to these constraints and prioritize security tasks.
But how, exactly, should you go about strategically prioritizing your security needs? How can you determine which aspects need to be addressed first and which can be dealt with later? After all, aren’t they all important? Read more “How to Prioritize Security Tasks When You Have Limited Resources”
Last night we got together with our good friends from PagerDuty to host an event at District Hall in the Seaport area of Boston. It was a fun evening, offering product-related presentations, a wide-ranging panel discussion, and an opportunity to socialize with friends, colleagues, and other like-minded folks.
Before we go further, you may ask why we’re teaming up with PagerDuty. PagerDuty and Threat Stack have a tight product integration that enables you to manage all types of alerts in one place, making sure you have an end-to-end security solution that alerts you when the unexpected occurs. A great combination! Read more “Boston Cloud Security & Incident Management Workshop Recap”
Moving to and scaling in the cloud — especially for those who came from on-premise environments — can not only be overwhelming, but confusing, too. With new services available to your organization, policies to adhere to, and users and systems to secure, where should you begin?
Many of us at Threat Stack, including myself, have worked with on-premise environments at other organizations. So we understand the experience of being overwhelmed and confused when it comes to getting started securing your cloud or hybrid environment. The good news is that we have some real experts and great customers who have helped us identify best practices for transitioning to and scaling in a cloud environment, and we want to share those with you!
We use a Cloud Maturity Model as a starting point. Essentially, it lays out the stages and activities companies should follow to mature their cloud environment — but we believe secure cloud computing needs to play a bigger part. As such, the Threat Stack team agreed it was time to develop a Cloud Security Maturity Model to help companies understand, step by step, how to implement and scale security as they grow in the cloud.
Read more “Adopt a Cloud Security Maturity Model to Guide Your Journey in the Cloud”