The business benefits of moving to the cloud are myriad, from increased efficiency to reduced costs and even expanded business opportunities. And while there has been some circulating fear around how secure a business’s data can really be in the cloud, a recent study found that 94 percent of businesses actually saw an improvement in their security posture after moving to the cloud.
Of course, moving your data and systems to the cloud isn’t risk-free, as the many data breaches that have graced the news over the last few years prove. If you want to benefit from the cloud but not open yourself up to all kinds of vulnerability, you need to invest in security.
Read more “7 Signs Your Business Should Outsource Cloud Security”
While the XOR DDoS Trojan has been active for over a year, we’ve seen a recent surge of coverage and blog posts recently. We’ve also seen the Groundhog variant emerge. This has prompted a few of our customers to ask how their Threat Stack deployment will detect this type of attack and activity as well as what new rules need to be added to detect this.
Read more “Threat Stack, the XOR DDoS and the Groundhog Variant”
Security is a major concern and potential road block for companies starting up in the cloud or considering a move into the cloud. Incidents such as the most recent high-profile attack on “online cheating site” Ashley Madison do little to assuage those fears as companies must consider how to best protect themselves from external and insider threats
Read more ““The Call is Coming from Inside the House” Insider Threats Pose Major Security Concerns for Enterprise”
On September 24, 2014, a bug in the Unix Bash shell known as Shellshock was disclosed. The vulnerability widely affected Linux distributions, was easy to exploit, and allowed an attacker to gain unauthorized access to a computer system. This net shattering event left many organizations wondering whether they were compromised and if so, the extent of the damage.
That’s why on Wednesday, December 10th at 1:30pm EST, our Co-Founder and Chief Scientist, Jen Andre, and CEO, Doug Cahill, will be discussing lessons learned from this vulnerability and what companies can do to stay protected from the next one.
During this webinar you will learn how to:
- Uncover new threats
Using behavioral-based intrusion detection to protect against zero day attacks.
- Protect your customer data
Using continuous security monitoring and auditing to keep data secure.
- Reduce your EC2 workload attack surface
Gaining visibility and understanding your security coverage in AWS.
Join us for this live, interactive discussion and you will also receive a Threat Stack t-shirt. The webinar is already filling up fast — save your seat today for “Preparing for the Next Shellshock”.
While many companies have become exceptional at protecting against external threats, is there ever worry for attacks happening internally? Enterprises are focused on stabilizing perimeter defenses against outside hackers, but according to a recent report by Forrester, internal breaches have become the top source of breaches in 2013, with 36% of breaches originating from employees.
Read more “Insider Threats: Your Biggest Risk”