Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

The RNC Data Exposure: Learnings and Actions to Take

by Natalie Walsh , posted in Vulnerabilities, Cyber Threats, RNC Data Exposure, Risk Acceptance & Management

RNC Data Exposure Blog Banner.png

Recently, headlines were hyping the largest ever exposure of voter information, involving some 9.5 billion data points related to 198 million U.S. voters. 

Attention-getting stuff. And since the story involved the Republican National Committee (RNC), the hype was intensified. Somewhat imprecisely, many articles characterized the incident as a data “leak”, “breach”, or “compromise” — again, adding to the intensity, but not the accuracy of what actually happened.

I’m not trying to minimize the seriousness of the issue — the potential damage was enormous as were the implications regarding security and privacy. But now that some of the dust has settled, it’s time to back away from the headlines and explore what actually happened.

So let’s see what we can learn from the RNC data exposure — and more importantly — what we can and must do to better protect our data and systems going forward.

Read More [fa icon=long-arrow-right"]

Jun 23, 2017 3:39:23 PM

[fa icon="comment"] 0 Comments

3 Key Points on How Vulnerability Management Can Help You Become Compliant

by Travis Wilkins , posted in Vulnerability Management, Regulatory Compliance

Vuln Management Compliant Blog Banner.png

Two interesting observations:

The average number of days that attackers were present on a victim’s network before being discovered is 146 days. (FireEye)

At Threat Stack, we have observed that a majority of the market is moving toward automated security vulnerability and configuration scanning.

You would be hard pressed to come by a compliance framework that did not require you to have a system to detect and manage vulnerabilities. Vulnerabilities are as old as technology itself, so to call yourself compliant, you first need to demonstrate that you have a sound vulnerability management program in place.

Vulnerability management systems identify common vulnerabilities and exposures (also known as CVEs), alerting you when a server or package is at risk so you can patch it immediately.

Simply by having a vulnerability management program in place, you can often satisfy many other major compliance requirements. In this post, we’ll explain how vulnerability management helps you to become compliant.

Read More [fa icon=long-arrow-right"]

Jun 23, 2017 11:03:51 AM

[fa icon="comment"] 0 Comments

How Companies Can Provide Security Transparency to Customers and Prospects

by Jim McDonough, VP Inside Sales, Threat Stack , posted in Cloud Security, High Velocity Sales

Security Transparency Blog Banner.png

Leveraging Security in the Sales Process

Security is more than just a good business practice. It also serves as insurance for your customers that security is a top priority. With the right protections in place, you demonstrate that their data will be safe with you, and this can accelerate the sales cycle. But without good security, sales cycles can drag on or even grind to a halt. Of course, you need to start by having the right security technologies, processes, and personnel in place. Then, you need to be able to convey all of this to prospective and current customers.

In this post, we’ll explain what you need to do to guarantee robust security and how you can communicate this to customers and prospects, giving them visibility into your security measures.

Read More [fa icon=long-arrow-right"]

Jun 21, 2017 1:40:59 PM

[fa icon="comment"] 0 Comments

How to Drive Efficiencies When Meeting Compliance Under a Deadline

by David M. Weinstein , posted in Regulatory Compliance, Compliance in the Cloud, Security and Compliance Requirements

Drive Efficiencies Blog Banner.png

Let’s say you just found out that you need to be compliant with HIPAA or PCI DSS in order to win a big piece of new business for your organization.

Whether it’s a potential customer, a partner, a regulatory body or government making the demand, business often can’t move forward without demonstrable compliance with certain frameworks. And these can be thorny, complex, and time-consuming to meet.

You’ve heard the horror stories about becoming compliant — it can take twice as long as expected to get all your requirements up to par; it can cost way more than budgeted; and sometimes organizations don’t pass an audit even after all that hard work. 

So what do you do?

We know meeting compliance isn't a walk in the park. But if you’re prepared, you can cut to the chase a lot faster, within budget, and with fewer hiccups along the way. In this post, we’ll share a framework you can follow so you can get on the fast track to compliance. While a lot of tasks are involved in meeting compliance, there are ways to gain efficiencies as you work to meet a broad range of requirements. 

Ready to dive in?

Read More [fa icon=long-arrow-right"]

Jun 20, 2017 12:44:07 PM

[fa icon="comment"] 0 Comments

5 Pieces of Advice for Navigating the Security Culture Shift

by Natalie Walsh , posted in Cyber Security Awareness, Security Awareness Program, Security Culture

Security Culture Shift Blog Banner.png

As security threats become a bigger part of the day-to-day concerns at all types of organizations, it has become vital to inculcate and promote a “culture of security.” Yes, security is everyone’s responsibility — but it requires a shift in culture for people to begin accepting that responsibility.

Triggering this shift can be harder than it sounds on the surface. Why? Well, for one thing, most people in the organization don’t have their success measured on security. When the marketing team gets a performance review, no one brings up security. When a direct reward or consequence isn’t on the line, it can be more difficult to get people to buy in to their responsibility to help keep the company secure.

That said, it’s not impossible by any means. It just requires focused and sustained effort to change the culture. As with any culture shift, it won’t necessarily be easy or linear, but it is achievable. Here are a few steps you can take to help your team more security-minded.

Read More [fa icon=long-arrow-right"]

Jun 19, 2017 3:17:58 PM

[fa icon="comment"] 0 Comments

Threat Stack Rocks TechJam 2017

by The Threat Stack Team , posted in TechJam 2017

Boston TechJam 2017 Blog Banner.png

Thank you TechJam!

You promised Speakers, Music, Food Trucks, Libations and Games, and you delivered the most awesome block party we’ve ever been to.

Read More [fa icon=long-arrow-right"]

Jun 16, 2017 12:01:04 PM

[fa icon="comment"] 0 Comments

Risk Acceptance & Business Payout

by Travis Wilkins , posted in Risk Management, Cyber Security Awareness, Risk Acceptance, 4 Rs Risk Management Methodology

Gartner Summit 2017 Blog Banner.png

Key Takeaways From the Gartner Security & Risk Management Summit 2017

I just got back from the Gartner Security & Risk Management Summit with three key takeaways that I would like to share. Overall, industry leaders indicate that cybersecurity should be treated as a business function, not as a tax, and to achieve this, we need to base our security approach on:

  1. An attitude and culture of Risk Acceptance
  2. A Risk Management Methodology that enables us to detect and manage risk
  3. Effective alignment with the CEO and BoD by making risk-based decisions focused on business goals

Let’s get into the details.

Read More [fa icon=long-arrow-right"]

Jun 15, 2017 12:31:12 PM

[fa icon="comment"] 0 Comments

14 Questions to Ask Yourself Before Committing to a Cybersecurity Vendor

by Natalie Walsh , posted in Vendor Selection, Selecting a Cybersecurity Vendor

Cybersecurity Vendor Blog Banner.png

The cybersecurity tech market is crowded. Very crowded.

Whether you’re in security, IT, or another related discipline, choosing vendors and products can be overwhelming and frustrating — and making bad choices can be costly up front as well as down the road. To bring some clarity to the process, we’ve put together a brief list of questions. Together, they should help you develop a basic understanding of your needs and capabilities so you can start identifying appropriate offerings and vendors in the cybersecurity marketplace.

(Note: In an upcoming post, we’ll examine some of the key technical issues you need to consider before selecting a security product or solution.)

Read More [fa icon=long-arrow-right"]

Jun 14, 2017 12:15:12 PM

[fa icon="comment"] 0 Comments

Vulnerable vs. Exploitable: Why These are Different & Why it Matters

by Anthony Alves , posted in Vulnerabilities, Vulnerability Management, Exploits

Vulnerable vs Exploitable Blog Banner.png

Pop quiz: What’s the difference between vulnerable and exploitable?

As we’ve written before, a vulnerability is a weakness in a software system. And an exploit is an attack that leverages that vulnerability. So while vulnerable means there is theoretically a way to exploit something (i.e., a vulnerability exists), exploitable means that there is a definite path to doing so in the wild. Naturally, attackers want to find weaknesses that are actually exploitable. As a defender, being vulnerable isn’t great, but you should be especially worried about being exploitable.

There are a few main reasons why something that is theoretically vulnerable is not actually exploitable:

  1. There may be insufficient public information to enable attackers to exploit the vulnerability.
  2. Doing so may require prior authentication or local system access that the attacker does not have.
  3. Existing security controls may make it hard to attack.

 Below, we’ll explain why this matters and how you can use it to improve your security posture.

Read More [fa icon=long-arrow-right"]

Jun 13, 2017 12:49:53 PM

[fa icon="comment"] 0 Comments

Jun 12, 2017 11:59:08 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all