All Things Compliance
4 Min Read January 23, 2017
To Build or Buy Your Own Security Platform: That is the Question
What’s your priority: to become a Security Company or be a Secure Company? If you’re truly in the security business, then of course you’ll be building your own security platform. For all the rest, please keep reading . . . In this post I will cover some of the challenges involved in building a cloud security […]
5 Min Read September 1, 2016
A Blueprint for Selecting Security Technologies Inside the Cloud
Cloud security operations teams, especially ones that are looking at security technologies for the first time, are often faced with a daunting list of vendors who offer technologies with wide-ranging capabilities. Understanding the pros and cons of each might seem difficult or impossible at first, especially because the enterprise security sector is inundated with technologies […]
3 Min Read May 26, 2016
How to Create an Effective Cloud Security Alerting Process
The first component of any security program should be an alert system. Alerts are typically the fastest and most effective way to be notified when something goes wrong so you can jump into action. But alerts also have the stigma of being too noisy, throwing out false positives, or requiring a lot of fine tuning […]
5 Min Read May 13, 2016
Creating a Framework to Enable Compliance in the Cloud
How many times have you finished a 1,000-piece puzzle? How about a serious game of Monopoly? Both of these activities have parallels with the process of meeting compliance regulations.
< 1 Min Read April 14, 2016
New Webhook API — Unleashing the Power of Real-Time Security Alerts
With today’s announcement, Threat Stack continues its commitment to driving increasingly efficient security workflows. The addition of a new webhook API builds on the integrations that Threat Stack has already created with PagerDuty, Slack, Docker, AWS, and others — giving our customers almost endless possibilities for developing custom, automated workflows based on alerts.
3 Min Read April 4, 2016
Does Your Cloud Security Strategy Include These 5 Things?
There are a few things you just don’t leave home without — your keys, your wallet and usually, a large cup of coffee. These are the daily tools you use to get in and out of places, acquire things you need, and keep you alert and energized. This is not much different from your daily […]