Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Megan Rees Ahigian

Megan Rees Ahigian is a Senior Product Manager at Threat Stack. She has built software products for a range of end users from elementary students to data center administrators. When she’s not busy securing the cloud, she can be found traveling, watching Bravo, or spending time with her dog.

Recent Posts

Write Your Own AWS Configuration Auditing Rules With Threat Stack’s Guided Rules Editor

by Megan Rees Ahigian , posted in Cloud Security, AWS Configuration Auditing, Guided Rules Editor, AWS Configuration Auditing Rulesets

Config Audit Rules Editor Blog Banner.png

Today Threat Stack is excited to announce a powerful and easy-to-use new feature of the  AWS Configuration Auditing capabilities — the Guided Rules Editor for AWS Configuration Auditing. With the Guided Rules Editor, available immediately in the Threat Stack Audit Plan,  users can quickly tailor AWS Configuration Auditing rulesets to their organization’s specific security policies and adapt to changes in their environment.

Read More [fa icon=long-arrow-right"]

Mar 16, 2017 9:21:36 AM

[fa icon="comment"] 0 Comments

A Year in the Life of Threat Stack’s Cloud Security Platform®

by Megan Rees Ahigian , posted in CSP, Threat Intelligence, Cloud Security Platform, Vulnerability Monitoring, AWS Configuration Auditing

CSP Year Blog Banner.jpg

Before we get too far into 2017, we want to take a final look back at 2016 — specifically at some of the great enhancements we made to Threat Stack’s Cloud Security Platform®.

In the security world, 2016 was filled with major incidents, including massive data breaches, nation-state cyber interference, crippling DDoS attacks, and increased numbers of ransomware incidents — along with all the less glamorous, day-to-day security threats that had the potential to impact every cloud-based business in existence. So much for the bad news!

At Threat Stack, 2016 was the year we transformed our best-of-breed Host Intrusion Detection System into the industry’s first cloud-native, end-to-end Cloud Security Platform to deliver a unified view into workloads, infrastructure monitoring, vulnerability management, threat intelligence, and compliance reporting.

Read More [fa icon=long-arrow-right"]

Jan 3, 2017 12:35:48 PM

[fa icon="comment"] 0 Comments

Threat Stack Broadens Cloud Security Platform With New Configuration Auditing

by Megan Rees Ahigian , posted in Cloud Security, AWS Security, Cloud Security Platform, AWS Configuration Auditing

Config Audit Blog Banner.jpg

How securely configured is my AWS environment? Have I checked all the right boxes? Have I locked all my doors and windows?

With the release of AWS Configuration Auditing — a major new feature of the Threat Stack Cloud Security Platform® (CSP) — Threat Stack is the only cloud security monitoring platform that enables customers to assure that their AWS environment is configured to policy and from there, implement continuous security monitoring, alerting, and investigation at any stage in their company’s cloud maturity lifecycle.

Configuration Auditing enables Threat Stack customers operating in AWS to implement AWS security best practices by automatically auditing current environments and providing an immediate, concise report of configurations that are non-compliant with best practices. Threat Stack then offers steps to remediate the issues and make the AWS environment more secure.

Read More [fa icon=long-arrow-right"]

Dec 1, 2016 10:37:16 AM

[fa icon="comment"] 0 Comments

Threat Stack Cloud Security Platform: Streamlined Workflows, Part 2

by Megan Rees Ahigian , posted in Cloud Security, Threat Stack Cloud Security Platform, HIDS, Workflow Enhancements, Server Management, Software Vulnerability Assessment & Management

CSP Streamlined Workflow Part2.jpg

In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security platform with all the features users need to keep their cloud environments protected as they scale.

More recently, we have focused on our second goal — streamlining workflows in three key areas of our Cloud Security Platform® — to ensure that it is easy to use and customize, thus enabling users to move as fast as possible while they prioritize security issues and strengthen their organization’s security.

In Part 1 of this series I explained how we streamlined our Host Intrusion Detection (HIDS) workflows. In Part 2, I am going to describe improvements we’ve made to workflows in the following two areas:

  • Server Management
  • Software Vulnerability Assessment and Management

Read More [fa icon=long-arrow-right"]

Nov 30, 2016 11:31:06 AM

[fa icon="comment"] 0 Comments

Threat Stack Cloud Security Platform: Streamlined Workflows, Part 1

by Megan Rees Ahigian , posted in Cloud Security, Threat Stack Cloud Security Platform, HIDS, Workflow Enhancements

CSP Streamlined Workflows Blog Banner.jpg

At Threat Stack, we have two high-level goals when it comes to product development. First, we want to continue to build a powerful, cloud-based security platform with all the features users need to keep their cloud environment protected as they scale. And second, we want to create a platform that’s easy to use and customize, so users can move as fast as possible and also strengthen their organization’s security.

In the first part of 2016 we put a large effort into the first goal, increasing the breadth and depth of our feature set, including vulnerability assessment, more powerful investigative tools, etc. Recently we have focused heavily on the second goal, streamlining workflows in three areas of our Cloud Security Platform®:

  • Host Intrusion Detection (HIDS) Rules Management
  • Management of Servers protected by Threat Stack
  • Software Vulnerability Assessment and Management

In this post, I’ll discuss how users can customize HIDS using the streamlined rules management functionality. In a follow-up post, I will talk about streamlined workflows that are now available for server management and software vulnerability assessment and management.

Read More [fa icon=long-arrow-right"]

Nov 16, 2016 11:38:58 AM

[fa icon="comment"] 0 Comments

5 Ways Product Managers Can Get Closer to Their Customers in the Cloud

by Megan Rees Ahigian , posted in Cloud Security, Product Enhancements, Customer Experience, Product Management

Product_Managers_Closer_to_Customers_Cloud_Blog_Banner.jpg

As a Product Manager, it‘s always your job to expand your understanding of the customer by finding out what they like and need, learning about problems they’re having, and listening to their ideas for new and improved features.

Read More [fa icon=long-arrow-right"]

Oct 12, 2016 2:34:46 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all