Your Reference for Selecting a Cloud Security Platform
To help you through the process of matching your organization’s requirements with available security solutions, we’re offering you our free Cloud Infrastructure Security Buyer’s Guide. Read more “New eBook: Cloud Infrastructure Security Buyer’s Guide”
This is another landmark day in Threat Stack’s growth: It’s with great excitement that we announce that Threat Stack has secured $45 million in a Series C funding round led by F-Prime Capital Partners (the venture capital group associated with the parent company of Fidelity Investments), and Eight Roads Ventures, along with participation from existing investors Scale Venture Partners, .406 Ventures, and Accomplice.
Leveraging strong customer adoption and robust organic growth, we have set our sights on expanded opportunities in existing markets as well as entry into new sectors. Further investment in innovation will consolidate Threat Stack’s leadership in the cybersecurity market as we continue to develop the industry’s most comprehensive intrusion detection platform for cloud, hybrid-cloud, and on-premise environments.
Read more “Threat Stack Raises $45M in Series C Funding to Accelerate Cybersecurity Innovation & Market Expansion”
Cloud compliance, like cloud security, is never a one-and-done activity. To be compliant, you need to demonstrate it continuously. Systems must be locked down properly, users must follow specific access policies, alerts must be working properly, and so on. If a server is spun up and unprotected, if a user gets too much privileged access, or if alerts are ignored, you can quickly become noncompliant.
So how do you maintain cloud compliance day-in and day-out amongst all your other priorities? In this post, we’ll outline several ways that you can ensure compliance organization-wide, even after the big audit is complete. Read more “What is Continuous Cloud Compliance & How Can I Achieve It?”