Latest Blogs About "Security"

80 total posts.

2 Min Read
VPNNotify: A VPN Notification bot for Slack

Pat Cable

September 5, 2017

In an earlier post, we talked about how we implemented centralized authentication at Threat Stack. This project initially allowed us to create ...

2 Min Read
Authkeys: Making Key-Based LDAP Authentication Faster

Pat Cable

April 21, 2017

Authkeys, Threat Stack’s new open source tool, performs LDAP lookups of SSH keys without the need for using scripts or other interpreted code. You ...

2 Min Read
Balancing Security and Your On-Call Rotation Using Deputize

Pat Cable

April 14, 2017

Threat Stack, like many other Software-as-a-Service providers, has an on-call rotation. During any week, two members of our engineering organization ...

3 Min Read
DevOpsing at Home

Vitaliy Zakharov

March 13, 2017

I remember the days when SysAdmins bragged about server uptimes that were sometimes measured in years. I have been out of the SysAdmin world for ...

5 Min Read
Post Mortem: Death Star Data Breach by ROGUE ONE

Tom McLaughlin

December 16, 2016

Recently the Galactic Empire's Death Star plans were leaked due to a security breach on the planet Scarif. A threat actor known as ROGUE ONE ...

3 Min Read
The USENIX LISA 2016 Conference: In Their Own Words

Tom McLaughlin

December 16, 2016

The USENIX LISA 2016 Conference wrapped up a week ago after a tremendous five-day program of workshops, training sessions, presentations, talks, and ...

5 Min Read
AWS re:Invent 2016 Sets Records for New Services and Attendance

Tom McLaughlin

December 5, 2016

Interested in attending AWS re:Invent 2017? Take a look at what we'll be up to. AWS re:Invent 2016 has come and gone and what an event it was! This ...

5 Min Read
5 Things Security Can Learn From Operations' Transition Into DevOps

Tom McLaughlin

December 2, 2016

Over the past couple of years, a discussion has been brewing in the Security community about the future of its work. On one hand, the need for a ...

3 Min Read
The Realities of Hybrid Computing Today & How to Stay Secure

Tim Armstrong

November 30, 2016

As we hurtle into the future, it often seems that talk in the tech media revolves around cloud computing. But the reality for many companies, ...

4 Min Read
How to Conduct a Blameless Security Post-Mortem

Pete Cheslock

November 11, 2016

When someone in your company clicks on a bad link, it can spell bad news. But you know what’s worse? Them never telling you. When employees are ...

5 Min Read
The 5 Ingredients of a Successful SecOps Implementation

Pete Cheslock

November 3, 2016

Ask three people what SecOps is and chances are you’ll get three different descriptions: It’s a team It’s a job title It’s a ...

3 Min Read
Increasing Security Response Velocity

Craig Chamberlain

November 1, 2016

I recently added a Starz subscription to my Amazon Prime and found a new supply of science fiction movies. One of these, Deja Vu, is a time travel ...

5 Min Read
Will SecOps Finally Close the Security and Operations Gap? A Q&A with Pete Cheslock

Pete Cheslock

October 27, 2016

At Threat Stack, we’ve been a SecOps-oriented team from day one. This means our developers, operations, and security practitioners all work ...

4 Min Read
IoT Botnets and DDoS: A New Reality With New Responsibilities

Tim Armstrong

October 26, 2016

Last Friday, multiple massive distributed denial ofservice (DDoS) attacks hit Dyn, an internet performance management company headquartered in New ...

5 Min Read
Five Lessons We Learned on Our Way to Centralized Authentication

Pat Cable

October 25, 2016

In many startups, centralized authentication is a "future us" problem. Setting up centralized auth is useful for managing your network, but requires ...

5 Min Read
Better Security Through UX, Part 2: Visual Design and Emotion

Jim O'Neill

September 28, 2016

In Part 1 of this series, I introduced the theme that good user experience (UX) design can actually promote better security overall, by fostering ...

4 Min Read
How to Create a Security-Minded DevOps Organization: Three Best Practices

Pete Cheslock

September 22, 2016

You’re a week into your new job and a colleague shouts out across the room before a big deployment: “Hey John, you’ve got security covered, ...

4 Min Read
Why All Employees Should Be Security Ambassadors — and How to Do It

Pete Cheslock

September 15, 2016

A recent Motherboard article caught our eye and got us thinking about who is — and who should be — responsible for security in an organization. ...

3 Min Read
Better Security Through UX, Part 1

Jim O'Neill

August 10, 2016

How effective is a security tool if people don’t like using it? A fancy floor mop sits in my closet. It’s a Swiffer WetJet, and with one look you ...

4 Min Read
Pokémon GO & Security: Who are All These Strange People in the Lobby?

Tom McLaughlin

July 12, 2016

Just in case you were wondering, the @nytimes building is a Pokegym. — Runa A. Sandvik (@runasand) ...

4 Min Read
Insider Threats: What You Need to Know and Do

Threat Stack Marketing Team

June 23, 2016

Threats to your data and security don’t always start on the outside, orchestrated by a shadowy group of foreign hackers. Many times, it’s actors ...