Threat Stack Blog

Continuous security monitoring for your cloud.

New Case Study:
Protecting Customer Data & Meeting SOC 2 Compliance

by Palen Schwab, posted in Compliance, Customers, SOC 2, Continuous Cloud Security

We recently spoke with Threat Stack customer Jameel Al-Aziz, DevOps/Software Engineer for 6sense, and developed the below case study that showcases how Al-Aziz and his team are using Threat Stack. Al-Aziz also details in the case study the company-wide benefits they are realizing, including a shortened sales cycle, by having a continuous security monitoring solution in place. Below is their story.

Read More [fa icon=long-arrow-right"]

Apr 21, 2015 10:26:47 AM

[fa icon="comment"] 0 Comments

See Threat Stack at AWS Enterprise Summit 2015 in San Francisco Next Week

by Kristin Dziadul, posted in Cloud Security, AWS, AWS Security, EC2 Security, AWS Summit San Francisco

 

AWS-Summit_Option-White-San Francisco.png


For the second year in a row, Threat Stack will be attending and exhibiting at the AWS Enterprise Summit, this time at the Moscone Center in San Francisco. Throughout the past year alone, our integration with AWS has grown even deeper, helping customers effectively meet their responsibilities within the shared security model. We look forward to sharing the significant advances on our platform with the AWS community during the AWS Summit next week.

Read More [fa icon=long-arrow-right"]

Apr 1, 2015 10:53:00 AM

[fa icon="comment"] 0 Comments

A Deep Dive on Threat Stack: Recap of our Live Product Q&A

by Kristin Dziadul, posted in Cloud Security, Webinar, Continuous Cloud Security, EC2 Integration, AWS Integration

This week our product team, led by Chris Gervais, Threat Stack’s VP of Engineering, and Aaron Botsis, Threat Stack’s Product Manager, hosted a live Q&A webinar, diving into the intricacies of security for cloud-native environments and what Threat Stack is doing about it. Before the webinar, we asked attendees to submit their most pressing questions, letting them take the reigns in the discussion. We had many great questions come in and took care to cover as many as possible. We also demoed Threat Stack itself to show how the platform works and some recent updates based specifically on customer feedback.

Read More [fa icon=long-arrow-right"]

Mar 26, 2015 9:28:40 AM

[fa icon="comment"] 0 Comments

Get The Inside Scoop: Join Our Live Product Q&A Webinar

by Palen Schwab, posted in Webinar

Whether you’re a current Threat Stack customer or not, there is a lot you’ll be interested to learn in regards to proactively protecting your company’s cloud-resident data with Threat Stack. It is our single most important mission to help you answer the questions that matter most in regards to cloud security. That’s why we’ve developed an exclusive product webinar on March 24th where we’ll let you take the reins. We will be providing a lot of information that you may not yet know about Threat Stack’s capabilities, but a majority of the time will be spent answering your most pressing questions which you can submit to us prior to the webinar. We will take care to answer every question we can to elevate your knowledge about continuous cloud security and Threat Stack.

 

Read More [fa icon=long-arrow-right"]

Mar 11, 2015 2:43:00 PM

[fa icon="comment"] 0 Comments

Who Watches the Watchmen? Securing Configuration Management Systems

by Jen Andre, posted in Security, DevOps, Operations, Configuration Management

 

This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations pipelines from a security perspective.   

Read More [fa icon=long-arrow-right"]

Feb 24, 2015 9:41:00 AM

[fa icon="comment"] 0 Comments

Implementing Better DevOps Security: Expert Perspectives

by Kristin Dziadul, posted in Cloud Security, Webinar, DevOps, SecDevOps, EC2

On Wednesday, Threat Stack was featured in an important GigaOM webinar panel, Iron Clad DevOps Security for Your EC2 Environments. The panel included our own Director of Ops and Support, Pete Cheslock, along with David Linthicum of GigaOM, Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group. It was a deeply informative hour-long discussion which David himself claimed as one of the best security webinars he’s had. We couldn’t agree more!

 

Read More [fa icon=long-arrow-right"]

Feb 13, 2015 1:21:16 PM

[fa icon="comment"] 0 Comments

3 Reasons Why the Host Rules Cloud IDS

by Sam Bisbee, posted in Cloud Security, Intrusion Detection, IDS, Cloud IDS

 

To truly appreciate why companies like Threat Stack point to the Cloud as a watershed event in their corner of the software industry, one must push past the hype and worn platitudes about “the Cloud with a capital C.” The reality is that it is the side effects that have caused such a large impact, like cost of operation as a function of scaled purchasing power and the forcing of software-only solutions.

This has certainly been felt in intrusion detection systems (IDS). They have traditionally been deployed as network hardware devices enabled by access to the network infrastructure, but are struggling to find relevance in a world where the traditional network boundary no longer exists.

Read More [fa icon=long-arrow-right"]

Feb 5, 2015 1:44:00 PM

[fa icon="comment"] 0 Comments

Iron Clad DevOps Security for your EC2 Environments: Webinar with GigaOM

by Palen Schwab, posted in Continuous Security Monitoring, Webinar, SecDevOps, EC2

 

Gigaom-Webinar-Banner

Join Threat Stack's Director of Ops & Support, Pete Cheslock, as he discusses the security needs of modern, DevOps-managed infrastructures with Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group, in next week's GigaOM webinar. 

With the lack of sophisticated security features in public cloud infrastructure environments like AWS, it's critical for DevOps teams to implement audit trails in order to adhere to compliance and regulation mandates. Continuous security monitoring is the answer and on Febuary 11th, Pete, Greg and Matt will be discussing the importance of having this new level of visibility into an entire EC2 attack surface. 

Read More [fa icon=long-arrow-right"]

Feb 2, 2015 11:33:41 AM

[fa icon="comment"] 0 Comments

Our 2014 Retrospective

by Doug Cahill, posted in Announcements, Company, Updates, Team

As we prepare to move across the muddy Charles River from Cambridge to our new offices in Boston’s Innovation District, I find myself reflecting on our incredible progress in 2014. From RSA in February to AWS re:Invent in November, it has truly been a whirlwind highlighted by the awesome people that make up Threat Stack including our team, investors, partners, and most importantly, our customers. Thanks to all! So, what did we get done in 2014?

 

Read More [fa icon=long-arrow-right"]

Jan 21, 2015 11:29:00 AM

[fa icon="comment"] 0 Comments

The 12 Days of SecDevOps

by Jen Andre, posted in SecDevOps

secdevops

(Note: The full version of this post is on the SysAdvent blog. Below is a summary.)

Read More [fa icon=long-arrow-right"]

Dec 24, 2014 12:31:00 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all