7 Signs Your Business Should Outsource Cloud Security

The business benefits of moving to the cloud are myriad, from increased efficiency to reduced costs and even expanded business opportunities. And while there has been some circulating fear around how secure a business’s data can really be in the cloud, a recent study found that 94 percent of businesses actually saw an improvement in their security posture after moving to the cloud.

Of course, moving your data and systems to the cloud isn’t risk-free, as the many data breaches that have graced the news over the last few years prove. If you want to benefit from the cloud but not open yourself up to all kinds of vulnerability, you need to invest in security.
Read more “7 Signs Your Business Should Outsource Cloud Security”

Threat Stack, the XOR DDoS and the Groundhog Variant

While the XOR DDoS Trojan has been active for over a year, we’ve seen a recent surge of coverage and blog posts recently. We’ve also seen the Groundhog variant emerge. This has prompted a few of our customers to ask how their Threat Stack deployment will detect this type of attack and activity as well as what new rules need to be added to detect this.

Read more “Threat Stack, the XOR DDoS and the Groundhog Variant”

[Webinar] Beyond Detection and Response: Unveiling the Azazel Rootkit

Now that the dust has finally settled after RSA and we’ve had a chance to come up for a breath of fresh air, we’re excited to announce that we’re hosting our first webinar!

On Wednesday, March 19th at 1pm (one week from today) we will be presenting a webinar on “Detection, Response and the Azazel Compromise”. It will be, first and foremost, a cloud security tech talk with our CEO, Doug Cahill, and one of our founders, Dustin Webber, on the state of threat detection and response for cloud-based servers.

Read more “[Webinar] Beyond Detection and Response: Unveiling the Azazel Rootkit”