Threat Stack Blog

Continuous security monitoring for your cloud.

Who Watches the Watchmen? Securing Configuration Management Systems

by Jen Andre, posted in Security, DevOps, Operations, Configuration Management

 

This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations pipelines from a security perspective.   

Read More [fa icon=long-arrow-right"]

Feb 24, 2015 9:41:00 AM

[fa icon="comment"] 0 Comments

Implementing Better DevOps Security: Expert Perspectives

by Kristin Dziadul, posted in Cloud Security, Webinar, DevOps, SecDevOps, EC2

On Wednesday, Threat Stack was featured in an important GigaOM webinar panel, Iron Clad DevOps Security for Your EC2 Environments. The panel included our own Director of Ops and Support, Pete Cheslock, along with David Linthicum of GigaOM, Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group. It was a deeply informative hour-long discussion which David himself claimed as one of the best security webinars he’s had. We couldn’t agree more!

 

Read More [fa icon=long-arrow-right"]

Feb 13, 2015 1:21:16 PM

[fa icon="comment"] 0 Comments

3 Reasons Why the Host Rules Cloud IDS

by Sam Bisbee, posted in Cloud Security, Intrusion Detection, IDS, Cloud IDS

 

To truly appreciate why companies like Threat Stack point to the Cloud as a watershed event in their corner of the software industry, one must push past the hype and worn platitudes about “the Cloud with a capital C.” The reality is that it is the side effects that have caused such a large impact, like cost of operation as a function of scaled purchasing power and the forcing of software-only solutions.

This has certainly been felt in intrusion detection systems (IDS). They have traditionally been deployed as network hardware devices enabled by access to the network infrastructure, but are struggling to find relevance in a world where the traditional network boundary no longer exists.

Read More [fa icon=long-arrow-right"]

Feb 5, 2015 1:44:00 PM

[fa icon="comment"] 0 Comments

Iron Clad DevOps Security for your EC2 Environments: Webinar with GigaOM

by Palen Schwab, posted in Continuous Security Monitoring, Webinar, SecDevOps, EC2

 

Gigaom-Webinar-Banner

Join Threat Stack's Director of Ops & Support, Pete Cheslock, as he discusses the security needs of modern, DevOps-managed infrastructures with Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group, in next week's GigaOM webinar. 

With the lack of sophisticated security features in public cloud infrastructure environments like AWS, it's critical for DevOps teams to implement audit trails in order to adhere to compliance and regulation mandates. Continuous security monitoring is the answer and on Febuary 11th, Pete, Greg and Matt will be discussing the importance of having this new level of visibility into an entire EC2 attack surface. 

Read More [fa icon=long-arrow-right"]

Feb 2, 2015 11:33:41 AM

[fa icon="comment"] 0 Comments

Our 2014 Retrospective

by Doug Cahill, posted in Announcements, Company, Updates, Team

As we prepare to move across the muddy Charles River from Cambridge to our new offices in Boston’s Innovation District, I find myself reflecting on our incredible progress in 2014. From RSA in February to AWS re:Invent in November, it has truly been a whirlwind highlighted by the awesome people that make up Threat Stack including our team, investors, partners, and most importantly, our customers. Thanks to all! So, what did we get done in 2014?

 

Read More [fa icon=long-arrow-right"]

Jan 21, 2015 11:29:00 AM

[fa icon="comment"] 0 Comments

The 12 Days of SecDevOps

by Jen Andre, posted in SecDevOps

secdevops

(Note: The full version of this post is on the SysAdvent blog. Below is a summary.)

Read More [fa icon=long-arrow-right"]

Dec 24, 2014 12:31:00 PM

[fa icon="comment"] 0 Comments

A New Way to See Your EC2 Environment

by Aaron Botsis, posted in Continuous Security Monitoring, AWS, EC2, AWS Security

For companies using AWS for their cloud infrastructure, one of the biggest challenges faced by infrastructure teams is the ability to get a complete view of their entire EC2 environment quickly and easily.   

Read More [fa icon=long-arrow-right"]

Dec 22, 2014 4:50:55 PM

[fa icon="comment"] 0 Comments

Dec 18, 2014 9:20:00 AM

[fa icon="comment"] 7 Comments

Deconstructing Shellshock To Prepare For the Next One

by Palen Schwab

Yesterday, our Co-Founder and Chief Scientist, Jen Andre, and CEO, Doug Cahill, hosted a live webinar, “Preparing for the Next Shellshock.” Shellshock is the most notable and destructive vulnerability to date, and alongside POODLE and Heartbleed, 2014 has now been deemed the year with the most reported vulnerabilities in history.

Screen_Shot_2014-12-11_at_7.47.39_AM

Read More [fa icon=long-arrow-right"]

Dec 11, 2014 8:35:15 AM

[fa icon="comment"] 0 Comments

We’ve Raised $5M in Funding To Further Protect Cloud Environments From Intrusions & Data Loss

by Doug Cahill, posted in Announcements

We’re thrilled to announce today that we have raised an additional $5M in funding from Atlas Venture and .406 Ventures. The funding will be used to further develop and commercialize our cloud security monitoring service, which officially launched last month, and expand our footprint with customers using Amazon Web Services.

This announcement comes right on the heels of our highly successful and over subscribed beta program and officially launching on-stage in November at Amazon CTO Dr. Werner Vogel’s Start-up Launch keynote during the AWS re:Invent Conference.

Read More [fa icon=long-arrow-right"]

Dec 10, 2014 11:28:50 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all