Threat Stack Blog

Continuous security monitoring for your cloud.

Our 2014 Retrospective

by Doug Cahill, posted in Announcements, Company, Updates, Team

As we prepare to move across the muddy Charles River from Cambridge to our new offices in Boston’s Innovation District, I find myself reflecting on our incredible progress in 2014. From RSA in February to AWS re:Invent in November, it has truly been a whirlwind highlighted by the awesome people that make up Threat Stack including our team, investors, partners, and most importantly, our customers. Thanks to all! So, what did we get done in 2014?

 

Read More [fa icon=long-arrow-right"]

Jan 21, 2015 11:29:00 AM

[fa icon="comment"] 0 Comments

The 12 Days of SecDevOps

by Jen Andre, posted in SecDevOps

secdevops

(Note: The full version of this post is on the SysAdvent blog. Below is a summary.)

Read More [fa icon=long-arrow-right"]

Dec 24, 2014 12:31:00 PM

[fa icon="comment"] 0 Comments

A New Way to See Your EC2 Environment

by Aaron Botsis, posted in Continuous Security Monitoring, AWS, EC2, AWS Security

For companies using AWS for their cloud infrastructure, one of the biggest challenges faced by infrastructure teams is the ability to get a complete view of their entire EC2 environment quickly and easily.   

Read More [fa icon=long-arrow-right"]

Dec 22, 2014 4:50:55 PM

[fa icon="comment"] 0 Comments

Dec 18, 2014 9:20:00 AM

[fa icon="comment"] 7 Comments

Deconstructing Shellshock To Prepare For the Next One

by Palen Schwab

Yesterday, our Co-Founder and Chief Scientist, Jen Andre, and CEO, Doug Cahill, hosted a live webinar, “Preparing for the Next Shellshock.” Shellshock is the most notable and destructive vulnerability to date, and alongside POODLE and Heartbleed, 2014 has now been deemed the year with the most reported vulnerabilities in history.

Screen_Shot_2014-12-11_at_7.47.39_AM

Read More [fa icon=long-arrow-right"]

Dec 11, 2014 8:35:15 AM

[fa icon="comment"] 0 Comments

We’ve Raised $5M in Funding To Further Protect Cloud Environments From Intrusions & Data Loss

by Doug Cahill, posted in Announcements

We’re thrilled to announce today that we have raised an additional $5M in funding from Atlas Venture and .406 Ventures. The funding will be used to further develop and commercialize our cloud security monitoring service, which officially launched last month, and expand our footprint with customers using Amazon Web Services.

This announcement comes right on the heels of our highly successful and over subscribed beta program and officially launching on-stage in November at Amazon CTO Dr. Werner Vogel’s Start-up Launch keynote during the AWS re:Invent Conference.

Read More [fa icon=long-arrow-right"]

Dec 10, 2014 11:28:50 AM

[fa icon="comment"] 0 Comments

Dec 8, 2014 12:20:49 PM

[fa icon="comment"] 0 Comments

How to Prepare for the Next Shellshock: [New Webinar]

by Palen Schwab, posted in Threats, Webinar, Shellshock, EC2

Webinar-banner

On September 24, 2014, a bug in the Unix Bash shell known as Shellshock was disclosed. The vulnerability widely affected Linux distributions, was easy to exploit, and allowed an attacker to gain unauthorized access to a computer system. This net shattering event left many organizations wondering whether they were compromised and if so, the extent of the damage.

That’s why on Wednesday, December 10th at 1:30pm EST, our Co-Founder and Chief Scientist, Jen Andre, and CEO, Doug Cahill, will be discussing lessons learned from this vulnerability and what companies can do to stay protected from the next one.

During this webinar you will learn how-to:

Uncover new threats

Using behavioral-based intrusion detection to protect against zero day attacks.

Protect your customer data

Using continuous security monitoring and auditing to keep data secure.

Reduce your EC2 workload attack surface

Gaining visibility and understanding your security coverage in AWS.

Join us for this live, interactive discussion and you will also receive a Threat Stack t-shirt. The webinar is already filling up fast -- save your seat today for “Preparing for the Next Shellshock”.

Save Your Seat

                     


                     
Read More [fa icon=long-arrow-right"]

Nov 25, 2014 10:02:08 AM

[fa icon="comment"] 0 Comments

4 Steps To Effectively Integrate DevOps Workflows With Cloud Security Practices

by Pete Cheslock, posted in Cloud Security, DevOps

I’ve spent most of my career in Operations, and the last 5 years at various organizations advocating and instilling DevOps principles in the teams I work with. One thing I’ve noticed is that most companies value speed over security, which has traditionally been a blocker in delivering software.  

Recently, however, with more and more breaches and vulnerabilities reported (Shellshock and Heartbleed to name a just few), I’ve changed my tune. I’m not going to say I’ve become paranoid, but one of the reasons I’ve joined Threat Stack is because I believe how important it is that security gets integrated into the operations process.   

Read More [fa icon=long-arrow-right"]

Nov 24, 2014 3:02:02 PM

[fa icon="comment"] 0 Comments

Announcements and Highlights: Threat Stack at AWS re:Invent 2014

by Kristin Dziadul, posted in Announcements, AWS, AWS ReInvent

We just returned from a great week in Las Vegas, NV for the AWS re:Invent Conference. The conference brought together over 13,500 developers, architects and many other technical users of the Amazon Web Services (AWS) infrastructure for an intensive four-day event. It is the year’s top spot to dive deep into the most pressing AWS topics and issues as well as learn about new services and brings the entire AWS ecosystem together.

Threat Stack at AWS re:Invent

Read More [fa icon=long-arrow-right"]

Nov 20, 2014 12:29:24 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic