Threat Stack Blog

Continuous security monitoring for your cloud.

Jun 23, 2016 3:02:16 PM

[fa icon="comment"] 0 Comments

Scaling Quickly & Securely: Achieving Security & Compliance in AWS

by Chris Gervais, posted in Cloud Security, Compliance, AWS, High-Velocity Cloud Security

TS16031_ThreatStack_AWSWebinarRecap_BlogImg.jpg

On Tuesday, June 21, I teamed up with Scott Ward, Solutions Architect at AWS, and Arup Chakrabarti, Director of Engineering at PagerDuty, to deliver a webinar about scaling quickly and securely in AWS. The discussion was lively enough to keep beach-and-BBQ dreams at bay for an hour or so on a humid Wednesday in Boston.

Read More [fa icon=long-arrow-right"]

Jun 22, 2016 2:16:57 PM

[fa icon="comment"] 0 Comments

A CFO’s Perspective on the Real Value of Cloud Security

by Kevin Durkin, posted in Cloud Security, Security

TS16031_ThreatStack_CFO_BlogImg.jpg

In the time I’ve been CFO at Threat Stack, I’ve had some interesting discussions about cloud security with fellow CFOs at a few of our customers and prospects. They know security is important, but just like me, they are tasked with managing limited resources to meet their strategic and financial objectives. They have a financial plan they need to deliver on as well as budgets and gross margin targets; and this means they are constantly balancing risks against expenditures.

Read More [fa icon=long-arrow-right"]

Jun 21, 2016 10:57:18 AM

[fa icon="comment"] 0 Comments

How to Apply DevOps Culture to Security & Why You Should Do It

by Pete Cheslock, posted in Cloud Security, Security, DevOps, Security-Enabled DevOps

TS16031_ThreatStack_DevOpsCulture_ThreatStack_BlogImg.jpg

Unless you’ve been living under a rock (or don’t work in the tech industry), you’ve probably heard the term DevOps thrown around. A mashup of “development” and “operations,” DevOps is a mindset and set of practices that focus on collaboration and communication between software developers and other IT professionals with the goal of automating both software delivery and infrastructure changes.

Read More [fa icon=long-arrow-right"]

Jun 17, 2016 8:35:26 AM

[fa icon="comment"] 0 Comments

The Top 7 AWS Security Issues: What You Need to Know

by Leigh Moore, posted in Cloud Security, AWS Security, Amazon Web Services (AWS)

TS16031_ThreatStack_AWSSecurityIssues_BlogImg.jpg

Despite the rapidly growing need for cloud-native visibility into behavior and activity across AWS environments, companies are still learning about best practices for security in the cloud.

Read More [fa icon=long-arrow-right"]

Jun 15, 2016 1:12:32 PM

[fa icon="comment"] 0 Comments

Best Practices for Baselining Your Cloud Security Environment

by Anthony Alves, posted in Cloud Security, Cloud Security Strategy

TS16031_ThreatStack_Oversight_BlogImgv2.jpg

Whether you intend to use managed services to handle your organization’s cloud security or have decided to create and manage your own security program, pulling together all the information you need can be a complex task to say the least. To help out, we want to share some of the insights and best practices we’ve gathered from Threat Stack’s managed security service.

Read More [fa icon=long-arrow-right"]

Jun 14, 2016 12:26:17 PM

[fa icon="comment"] 0 Comments

Jun 10, 2016 1:47:14 PM

[fa icon="comment"] 0 Comments

The Point Security Solution Implosion: 4 Things Companies Need to Know

by Palen Schwab, posted in Cloud Security, Cyber Security, Security Strategy

TS16031_ThreatStack_SecurityPointSolutions_BlogImg.jpg

Not even a decade ago, security was much simpler. Companies were defined by the perimeter of their corporate network and protected by a firewall and antivirus tool that could withstand just about any security attack. Then came the cloud, mobile devices, and the Internet of Things (IoT), and the attack surface overflowed far beyond the network, making security not-so-simple.

Read More [fa icon=long-arrow-right"]

Jun 9, 2016 11:17:48 AM

[fa icon="comment"] 0 Comments

Security From the Ground Up, Part 1: Choosing the Right Operating System

by Apollo Catlin, posted in Cloud Security, Cloud Environments, Cloud Operating Systems, Operating Systems

TS16031_ThreatStack_GroundUpPart1_BlogImg-1.jpg

If you're anticipating a move to the cloud — or you're continuing to grow and scale in the cloud  it’s a best practice to include security in your thinking from the outset. Now's the time to incorporate security into your cloud strategy so you can build it in from the ground up.

Read More [fa icon=long-arrow-right"]

Jun 7, 2016 4:03:08 PM

[fa icon="comment"] 0 Comments

How to Become a Great Business Development Representative

by Mimi Alperovich, posted in Team Building, Business Development Representatives, Career Development

TS16031_ThreatStack_BDR_ThreatStack_BlogImg-.jpg

About a week ago I started a fantastic new role as Director of Sales Prospecting & Business Development at the Boston-based Cloud Security company Threat Stack, working with a team that’s developing game-changing solutions in the cloud security space. I’m thrilled with my new role — building and leading a brand new team of BDRs to help sell this amazing technology. And I thought this would be a good time to reflect on how I arrived at this point in my career and see what lessons I can pass on to my new team.

Read More [fa icon=long-arrow-right"]

Jun 6, 2016 10:02:10 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all