Threat Stack Blog

Continuous security monitoring for your cloud.

Real-World ReactJS and Redux, Part 2

by Cristiano Oliveira, posted in ReactJS, Redux


When this happens do that... or side effects!

This is the second in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app at Threat Stack.

In this post, we'll be displaying actions based on an api middleware shown in Part 1.

Still making sure to answer these questions:

  • What is the ease of development?
  • How fast can new team members understand what's going on?
  • How fast can you figure out where something is broken?

Read More [fa icon=long-arrow-right"]

Aug 23, 2016 12:12:00 PM

[fa icon="comment"] 0 Comments

How Your End Users Can Enable Their Mobile Phones to Act as 2FA Devices, Part 3

by Tom McLaughlin, posted in Cloud Security, 2FA, 2-Factor Authentication


This is the third and final post in our series on using 2-Factor Authentication (2FA). In the first, we talked about why you need to replace SMS as a means of achieving 2FA, and introduced Duo Security as an effective way of doing this. In the second, we gave guidelines for setting up Duo Security at your organization.

Read More [fa icon=long-arrow-right"]

Aug 19, 2016 2:05:15 PM

[fa icon="comment"] 0 Comments

Can You Afford NOT To Be HIPAA Compliant?

by Anthony Alves, posted in HIPAA, Regulatory Compliance, Compliance in the Cloud, Compliance Audit


The Office of Civil Rights (OCR) has been alluding to a large-scale HIPAA audit for quite some time now — and it looks like that threat will soon come to pass.

Read More [fa icon=long-arrow-right"]

Aug 18, 2016 2:30:33 PM

[fa icon="comment"] 0 Comments

Real-World ReactJS and Redux, Part 1

by Cristiano Oliveira, posted in ReactJS


This is the first in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app at Threat Stack.

Read More [fa icon=long-arrow-right"]

Aug 17, 2016 1:12:38 PM

[fa icon="comment"] 0 Comments

3 Lessons Learned From AWS NYC Summit

by Palen Schwab, posted in Cloud Security, AWS Summit NYC


"I remember when there were only about 40 of us meeting here, talking about AWS, and ending the day by descending on the hotel bar." — Told to us by an AWS Summit Veteran

Read More [fa icon=long-arrow-right"]

Aug 16, 2016 2:22:17 PM

[fa icon="comment"] 0 Comments

How Wombat Security Uses Threat Stack to Secure Its Own AWS Infrastructure

by Trevor Hawthorn, posted in Cloud Security, AWS, AWS Integration, Amazon Web Services (AWS)


When Wombat Security Technologies and ThreatSim (acquired by Wombat in October 2015) decided to develop and deploy our suite of end user risk management and education solutions in Amazon Web Services (AWS), we went "into the cloud" with eyes wide open. We knew that, to realize the full potential of AWS (scale, cost, performance), we needed to “do AWS right.” This meant treating our servers like cattle, not like pets.

Read More [fa icon=long-arrow-right"]

Aug 15, 2016 1:36:15 PM

[fa icon="comment"] 0 Comments

How to Reconcile Different Definitions of PCI DSS and HIPAA Compliance

by Anthony Alves, posted in HIPAA, Cloud Security, Regulatory Compliance, Compliance in the Cloud, PCI DSS


Compliance would be challenging even if it were a black and white issue. The reality is that compliance regulations, such as PCI DSS and HIPAA, are really just a string of requirements open to interpretation. The definitions of each requirement can vary, sometimes quite a bit, from auditor to auditor or from company to company. Today, even the auditors are getting audited in an effort to ensure that the application of compliance regulations is as uniform as possible.

Read More [fa icon=long-arrow-right"]

Aug 12, 2016 12:59:25 PM

[fa icon="comment"] 0 Comments

IoT Meets Continuous Security Monitoring at Ayla Networks

by Adrian Caceres, posted in Cloud Security, Continuous Security Monitoring, IoT, Internet of Things


Ayla Networks is an Internet of Things (IoT) cloud platform-as-a-service (PaaS) company that enables manufacturers to build connected products. With more than 75 customers worldwide, many of whom are Fortune 1000 companies, Ayla knows that delivering a fast and secure platform is vital to our business. As a security-conscious company running completely in the cloud, we take a cloud-native approach to security and compliance. In this post, I’ll explain why we chose this approach and how we are implementing it today.
Read More [fa icon=long-arrow-right"]

Aug 11, 2016 9:07:23 AM

[fa icon="comment"] 0 Comments

Better Security Through UX, Part 1

by Jim O'Neill, posted in Cloud Security, Security, User Experience, UX, Customer Success


How effective is a security tool if people don’t like using it?

A fancy floor mop sits in my closet. It’s a Swiffer WetJet, and with one look you can see that its designers prioritized good user experience (UX). The weight, shape, and built-in spray nozzle make cleaning the floor easy, convenient, and — dare I say — almost fun. Before I got it, I had a regular old mop, which was messy, inconvenient, and a hassle to use. My new mop leaves its closet at least 3 times a week; the old one was lucky if it saw the light of day once a month.

Read More [fa icon=long-arrow-right"]

Aug 10, 2016 11:37:47 AM

[fa icon="comment"] 0 Comments

Useful Scala Compiler Options for Better Scala Development: Part 1

by Ryan Plessner, posted in Scala Best Practices, Scala Compiler, Scalac, Scala


At Threat Stack, we like to leverage our tools to the fullest. Since we use Scala, it only makes sense for us to always be looking into ways of getting the most out of the Scala Compiler to enhance our productivity. And, as it turns out, the Scala Compiler offers a number of features that makes our lives way better! 

Read More [fa icon=long-arrow-right"]

Aug 9, 2016 9:03:42 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all