Threat Stack Blog

Continuous security monitoring for your cloud.

How Twine Health Ensures Complete PHI Security and Privacy: Going Beyond HIPAA Checkboxes

by Bradley Harris, Director of Engineering at Twine Health, posted in HIPAA, Cloud Security, PHI, Compliance in the Cloud


Twine Health is a SaaS-based healthcare platform that connects patients and providers to enable collaborative care. We do business with entities as small as solo practitioners up to some of the largest healthcare organizations, which means we need to meet a wide range of security and compliance requirements in order to serve our customers.

Read More [fa icon=long-arrow-right"]

Jul 22, 2016 11:27:47 AM

[fa icon="comment"] 0 Comments

How to Build Lifetime Relationships With SaaS Customers

by Devin Behenna, posted in Cloud, Customer Success Management, CSM


On-demand, subscription-based services have taken over the technology world; a “one-and-done” contract is almost unheard of in today’s software industry, and this has changed the dynamic between you and your customers.

Read More [fa icon=long-arrow-right"]

Jul 21, 2016 1:20:17 PM

[fa icon="comment"] 0 Comments

How Compliance in the Cloud Can Strengthen Your Business

by Anthony Alves, posted in HIPAA, Compliance in the Cloud, PCI DSS


Often companies think of compliance as an annoying imposition — something to grin and bear. And while achieving compliance is not always a cakewalk, the upside of doing so can be huge. Whether you are interested in starting a company, entering a new market, or winning  new customers, achieving compliance can be a major business driver. Here’s why it’s beneficial to your bottom line to think about compliance in this way.

Read More [fa icon=long-arrow-right"]

Jul 20, 2016 11:07:05 AM

[fa icon="comment"] 0 Comments

My Journey in Scala, Part 2: Tips for Using IntelliJ IDEA

by Joe Baker, posted in Scala Best Practices, Scala, IntelliJ


After spending significant time in dynamic languages, learning Scala can be challenging, so having the right tools (like IntelliJ) at your fingertips can make all the difference.

Read More [fa icon=long-arrow-right"]

Jul 19, 2016 8:22:37 AM

[fa icon="comment"] 0 Comments

Jul 15, 2016 9:48:01 AM

[fa icon="comment"] 0 Comments

Announcing Threat Stack's Compliance Blog Post Series

by Anthony Alves, posted in HIPAA, Compliance, Regulatory Compliance, Compliance in the Cloud, PCI DSS


PCI DSS. HIPAA. SOC 2. SOX 404. Compliance can be a complicated and confusing beast, with plenty of acronyms and layers of regulations — not to mention expenses and stress. But achieving compliance in the cloud can also be the key to unlocking new sources of revenue, winning business, and achieving success in today’s competitive business environment.

Read More [fa icon=long-arrow-right"]

Jul 13, 2016 11:22:37 AM

[fa icon="comment"] 0 Comments

Pokémon GO & Security: Who are All These Strange People in the Lobby?

by Tom McLaughlin, posted in Security, cybersecurity, Pokemon

Read More [fa icon=long-arrow-right"]

Jul 12, 2016 6:47:18 PM

[fa icon="comment"] 0 Comments

My Journey in Scala, Part 1: Awakenings

by Joe Baker, posted in Scala Best Practices, Scala


When I started at Threat Stack over a year ago, I came in as a Platform Engineer expecting to work on JavaScript. I had no idea that Threat Stack would get bit by the Scala bug. But our first Scala app, created by another team member, went into production a couple of months after I joined, and I soon learned that Scala was way more than a passing fad at Threat Stack.

Read More [fa icon=long-arrow-right"]

Jul 12, 2016 4:16:44 PM

[fa icon="comment"] 0 Comments

Innovation and a Results-Oriented Culture Continue to Drive Success

by Brian Ahern, posted in CEO Update


As we enter the “dog days of summer,” we can’t help but reflect on the many events — regional, national, and global — that have been swirling around us throughout 2016.

Read More [fa icon=long-arrow-right"]

Jul 11, 2016 11:41:06 AM

[fa icon="comment"] 0 Comments

5 Tips for Reinforcing Your Organization's Cloud Security

by Pete Cheslock, posted in Cloud Security, cybersecurity


It’s every executive’s worst nightmare: becoming the next Target- or Anthem-style data breach headline. But aside from just hoping and praying that you won’t be the next victim, you can take some very practical and actionable steps to keep your organization safe and to ensure that, if you are breached, you’ll know right away.

Read More [fa icon=long-arrow-right"]

Jul 8, 2016 8:27:00 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all