Latest Blogs About "Cloud Security"

193 total posts.

3 Min Read
Threat Stack Cloud Security Platform: Streamlined Workflows, Part 2

Megan Rees Ahigian

November 30, 2016

In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security ...

3 Min Read
The Realities of Hybrid Computing Today & How to Stay Secure

Tim Armstrong

November 30, 2016

As we hurtle into the future, it often seems that talk in the tech media revolves around cloud computing. But the reality for many companies, ...

4 Min Read
Best Practices for Implementing & Scaling Security in AWS

Tim Armstrong

November 18, 2016

Security is a shared responsibility when you run your business on Amazon Web Services (AWS). To hold up your end of the bargain, there are many best ...

4 Min Read
4 Steps to Building a Security Awareness Program

Tim Armstrong

November 18, 2016

At Threat Stack, we develop security software, so it’s important to us that people have the technology they need to manage security issues in ...

3 Min Read
Threat Stack Cloud Security Platform: Streamlined Workflows, Part 1

Megan Rees Ahigian

November 16, 2016

At Threat Stack, we have two high-level goals when it comes to product development. First, we want to continue to build a powerful, cloud-based ...

3 Min Read
How to Verify That Compliance Controls and Processes are Being Met

Lindsey Ullian

November 15, 2016

Compliance is a complex, ongoing process. Between deciphering requirements into relatable terms, allocating a budget, and  assembling a team for ...

3 Min Read
3 Things You Can Do to Improve Your AWS Security Posture

Pete Cheslock

November 10, 2016

There’s no question that Amazon Web Services is an incredibly powerful and secure cloud services platform for delivering all sorts of software ...

5 Min Read
The 5 Ingredients of a Successful SecOps Implementation

Pete Cheslock

November 3, 2016

Ask three people what SecOps is and chances are you’ll get three different descriptions: It’s a team It’s a job title It’s a ...

3 Min Read
Increasing Security Response Velocity

Craig Chamberlain

November 1, 2016

I recently added a Starz subscription to my Amazon Prime and found a new supply of science fiction movies. One of these, Deja Vu, is a time travel ...

5 Min Read
Better Security Through UX Part 3: Responsiveness & Performance

Jim O'Neill

October 31, 2016

This series explores how good UI design plays a key role in keeping users secure by making them more inclined to trust and use their cloud security ...

5 Min Read
Will SecOps Finally Close the Security and Operations Gap? A Q&A with Pete Cheslock

Pete Cheslock

October 27, 2016

At Threat Stack, we’ve been a SecOps-oriented team from day one. This means our developers, operations, and security practitioners all work ...

4 Min Read
IoT Botnets and DDoS: A New Reality With New Responsibilities

Tim Armstrong

October 26, 2016

Last Friday, multiple massive distributed denial ofservice (DDoS) attacks hit Dyn, an internet performance management company headquartered in New ...

5 Min Read
Anatomy of an Attack: How the Cloud Gets Hacked

Tim Armstrong

October 24, 2016

The cloud is very different from on-premise infrastructure in several key ways. Some of these differences become apparent when it comes to external ...

3 Min Read
A Look Back at AppSecUSA: From Application Security to DevOps and Beyond

Tim Armstrong

October 18, 2016

Last week I spent two fantastic days in Washington, DC attending the AppSecUSA Conference on behalf of Threat Stack, one of the event’s Silver ...

3 Min Read
Cloud Security: Where to Get Started, Part 2

Pete Cheslock

October 17, 2016

Last week, we released Part 1 of a two-part series on the low-hanging security best practices companies can implement to improve their security ...

3 Min Read
Myth Busting 3 Objections to Buying Cloud Security Solutions!

Jim McDonough

October 14, 2016

I was sitting with my Sales Team last Friday, listening to their experiences with prospects. They had some great stories about wins and interesting ...

4 Min Read
Cloud Security: Where to Get Started, Part 1

Pete Cheslock

October 13, 2016

If you look at how and when different companies implement security, it’s clear the approach runs the gamut. Some go all in from day one while many ...

4 Min Read
5 Ways Product Managers Can Get Closer to Their Customers in the Cloud

Megan Rees Ahigian

October 12, 2016

As a Product Manager, it's always your job to expand your understanding of the customer by finding out what they like and need, learning about ...

4 Min Read
Protecting Sensitive Credentials by Sharing Secrets in the Cloud

Pat Cable

October 6, 2016

In the life of many organizations, developers and operations people need credentials that they can use in case of emergency — when, for example, ...

4 Min Read
How to Monitor Network Activity When Your Infrastructure Lacks an Edge

Pete Cheslock

September 29, 2016

It won’t be long before network perimeters are a thing of the past. As companies continue to adopt the cloud, either going all-in or operating in ...

6 Min Read
File Integrity Monitoring and Its Role in Meeting Compliance

Lindsey Ullian

September 27, 2016

When’s the last time someone made an unauthorized change to your system files? To answer this and other important security questions, as well as ...