Hybrid Security: How to Protect a Complex Environment

It is very clear by now that the cloud has reached an inflection point. Public cloud investment continues its rapid expansion, driven in large part by business imperatives for speed and scale. Gartner projects 18% cloud growth in 2017, with an increase of 36.8% for IaaS. So, the odds are your company is running at least some of its infrastructure in the public cloud.

Of course, no matter how many benefits it offers, it is often not possible for organizations to make a clean leap to the cloud. Many find themselves with infrastructures that include cloud, multi-cloud, hybrid, on-premise, and containerized environments. So what do you need to do to protect these complex structures?

We recently conducted a survey with ESG Strategy Group (Threat Stack Cloud Security Report 2017: Security at Speed & Scale) to learn more about the realities of hybrid environments today. Below are some of our findings as well as recommendations on how to secure your environment, no matter what it consists of. Read more “Hybrid Security: How to Protect a Complex Environment”

The State of Container Security: What We Learned From Our Survey

Containers are a big topic of conversation right now — and for good reason. They represent a powerful and transformative shift toward infrastructure that can enable flexibility and rapid development unlike anything we’ve seen before. However, as containers continue to proliferate, so do the security and compliance issues that surround them. Many in the market do not fully understand these concerns or how to address them. Our recent report with ESG Strategy Group (Threat Stack Cloud Security Report 2017: Security at Speed & Scale) bore this out.

Containers cannot solve every development or infrastructure problem; they are not the panacea that many believe them to be. But they do offer new opportunities that, when used properly, can move your organization forward. Read more “The State of Container Security: What We Learned From Our Survey”

Threat Stack Raises $45M in Series C Funding to Accelerate Cybersecurity Innovation & Market Expansion

This is another landmark day in Threat Stack’s growth: It’s with great excitement that we announce that Threat Stack has secured $45 million in a Series C funding round led by F-Prime Capital Partners (the venture capital group associated with the parent company of Fidelity Investments), and Eight Roads Ventures, along with participation from existing investors Scale Venture Partners, .406 Ventures, and Accomplice.

Leveraging strong customer adoption and robust organic growth, we have set our sights on expanded opportunities in existing markets as well as entry into new sectors. Further investment in innovation will consolidate Threat Stack’s leadership in the cybersecurity market as we continue to develop the industry’s most comprehensive intrusion detection platform for cloud, hybrid-cloud, and on-premise environments.
Read more “Threat Stack Raises $45M in Series C Funding to Accelerate Cybersecurity Innovation & Market Expansion”

What is Continuous Cloud Compliance & How Can I Achieve It?

Continuous Compliance

Cloud compliance, like cloud security, is never a one-and-done activity. To be compliant, you need to demonstrate it continuously. Systems must be locked down properly, users must follow specific access policies, alerts must be working properly, and so on. If a server is spun up and unprotected, if a user gets too much privileged access, or if alerts are ignored, you can quickly become noncompliant.

So how do you maintain cloud compliance day-in and day-out amongst all your other priorities? In this post, we’ll outline several ways that you can ensure compliance organization-wide, even after the big audit is complete. Read more “What is Continuous Cloud Compliance & How Can I Achieve It?”