Latest Blogs About "Cloud Security"

193 total posts.

4 Min Read
Invest in Security Using a 4 Point Plan

Kevin Durkin

September 23, 2016

In an earlier blog post I wrote about looking at security as an investment (as opposed to an expense), focusing on the value that an ...

4 Min Read
How to Create a Security-Minded DevOps Organization: Three Best Practices

Pete Cheslock

September 22, 2016

You’re a week into your new job and a colleague shouts out across the room before a big deployment: “Hey John, you’ve got security covered, ...

2 Min Read
Building Strong Partnerships: Why We’re a Proud Sponsor of the PagerDuty Summit

Threat Stack Marketing Team

September 20, 2016

After the Threat Stack team attended last week’s PagerDuty Summit in San Francisco, it became clear why PagerDuty is the market leader in agile ...

4 Min Read
Why All Employees Should Be Security Ambassadors — and How to Do It

Pete Cheslock

September 15, 2016

A recent Motherboard article caught our eye and got us thinking about who is — and who should be — responsible for security in an organization. ...

< 1 Min Read
The Compliance Playbook: How to Build PCI & HIPAA Compliant Businesses in the Cloud

Lindsey Ullian

September 14, 2016

The Threat Stack Compliance Playbook for Cloud Infrastructure is now available! The Compliance Playbook is intended for readers who want to ...

4 Min Read
The Importance of Security Monitoring to Achieving Compliance in the Cloud

Lindsey Ullian

September 8, 2016

Monitoring is the most reliable method of identifying and tracking users who are accessing data on company systems. Whether you’re on the lookout ...

3 Min Read
Proactive Software Testing Meets Proactive Security Monitoring at Applause

Thom Kenney

September 7, 2016

Software bugs, like security vulnerabilities, can crop up in unexpected places, and the only way you can really be prepared for them is by testing ...

3 Min Read
How Cloud Security Can Accelerate Your Sales Cycle

Jim McDonough

September 6, 2016

From my first day at Threat Stack, I’ve encountered one critical issue time after time: prospects who have had their sales cycle slow to a crawl or ...

5 Min Read
A Blueprint for Selecting Security Technologies Inside the Cloud

Venkat Pothamsetty

September 1, 2016

Cloud security operations teams, especially ones that are looking at security technologies for the first time, are often faced with a daunting list ...

6 Min Read
ShadowOps is Not Just Bad DevOps

Apollo Catlin

August 30, 2016

Some alarmists or buzzword-feeders like to say “DevOps is dead.” But this statement either betrays a grossly inaccurate understanding, or it’s ...

4 Min Read
How Your End Users Can Enable Their Mobile Phones to Act as 2FA Devices, Part 3

Tom McLaughlin

August 19, 2016

This is the third and final post in our series on using 2-Factor Authentication (2FA). In the first, we talked about why you need to replace SMS as a ...

6 Min Read
How to Reconcile Different Definitions of PCI DSS and HIPAA Compliance

Lindsey Ullian

August 12, 2016

Compliance would be challenging even if it were a black and white issue. The reality is that compliance regulations, such as PCI DSS and HIPAA, are ...

3 Min Read
IoT Meets Continuous Security Monitoring at Ayla Networks

Adrian Caceres

August 11, 2016

Ayla Networks is an Internet of Things (IoT) cloud platform-as-a-service (PaaS) company that enables manufacturers to build connected products. With ...

3 Min Read
Better Security Through UX, Part 1

Jim O'Neill

August 10, 2016

How effective is a security tool if people don’t like using it? A fancy floor mop sits in my closet. It’s a Swiffer WetJet, and with one look ...

5 Min Read
How to Implement 2FA Security in Your Organization Using Duo Security, Part 2

Tom McLaughlin

August 5, 2016

In a recent blog post I spoke about the need to find another way of achieving 2-Factor Authentication now that SMS has been deprecated by the ...

4 Min Read
How Does Compliance Differ In The Cloud Versus On-Premise?

Lindsey Ullian

August 4, 2016

With 253 healthcare breaches in 2015 for a total of 112 million lost records, HIPAA compliance has never been more relevant. Meanwhile, 80 percent of ...

4 Min Read
How to Replace SMS 2-Factor Authentication With Duo Security 2FA, Part 1

Tom McLaughlin

August 3, 2016

You’ve probably been investigating 2-Factor Authentication (2FA) more and more recently. With each new data breach or password dump in the news, ...

4 Min Read
From Agent Install to Mean Time to Know in Less Than 5 Minutes

Threat Stack Engineering Team

August 2, 2016

They say timing is everything — and when you go from installing an agent to detecting and remediating a security breach in less than 5 minutes, it ...

4 Min Read
Ending Alert Fatigue: Threat Stack and VictorOps On Modern-Day Security and Incident Management

Chris Gervais

July 28, 2016

Alert fatigue is a very real issue that security, ops, and dev teams are dealing with today. But how do you know if alerts are burning you out? And ...

2 Min Read
Why Sprout Social Chose Threat Stack to Secure Social Data for More Than 17,000 Brands

Aaron Rankin, CTO & Co-Founder of Sprout Social

July 26, 2016

The growth of content in social media is astounding. Today, brands receive 400% more social messages than they did a year ago. The nature of these ...

3 Min Read
How Twine Health Ensures Complete PHI Security and Privacy: Going Beyond HIPAA Checkboxes

Bradley Harris

July 22, 2016

Twine Health is a SaaS-based healthcare platform that connects patients and providers to enable collaborative care. We do business with entities as ...