Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Travis Wilkins

As Threat Stack’s Director of Product Marketing, Travis has 17 years of experience in technology and security in both the enterprise and consumer markets working at Symantec, Everbridge, and other SaaS technology businesses. With a focus on building go-to-market strategies that support customer needs, Travis has supported verticals including technology, healthcare, finance, and government, amongst others. Having attended St. Lawrence University for his BA and the Claremont Graduate University for his MBA, Travis is based in southern New Hampshire with his wife and two sons.

Recent Posts

3 Key Points on How Vulnerability Management Can Help You Become Compliant

by Travis Wilkins , posted in Vulnerability Management, Regulatory Compliance

Vuln Management Compliant Blog Banner.png

Two interesting observations:

The average number of days that attackers were present on a victim’s network before being discovered is 146 days. (FireEye)

At Threat Stack, we have observed that a majority of the market is moving toward automated security vulnerability and configuration scanning.


You would be hard pressed to come by a compliance framework that did not require you to have a system to detect and manage vulnerabilities. Vulnerabilities are as old as technology itself, so to call yourself compliant, you first need to demonstrate that you have a sound vulnerability management program in place.

Vulnerability management systems identify common vulnerabilities and exposures (also known as CVEs), alerting you when a server or package is at risk so you can patch it immediately.

Simply by having a vulnerability management program in place, you can often satisfy many other major compliance requirements. In this post, we’ll explain how vulnerability management helps you to become compliant.

Read More [fa icon=long-arrow-right"]

Jun 23, 2017 11:03:51 AM

[fa icon="comment"] 0 Comments

Risk Acceptance & Business Payout

by Travis Wilkins , posted in Risk Management, Cyber Security Awareness, Risk Acceptance, 4 Rs Risk Management Methodology

Gartner Summit 2017 Blog Banner.png

Key Takeaways From the Gartner Security & Risk Management Summit 2017

I just got back from the Gartner Security & Risk Management Summit with three key takeaways that I would like to share. Overall, industry leaders indicate that cybersecurity should be treated as a business function, not as a tax, and to achieve this, we need to base our security approach on:

  1. An attitude and culture of Risk Acceptance
  2. A Risk Management Methodology that enables us to detect and manage risk
  3. Effective alignment with the CEO and BoD by making risk-based decisions focused on business goals

Let’s get into the details.

Read More [fa icon=long-arrow-right"]

Jun 15, 2017 12:31:12 PM

[fa icon="comment"] 0 Comments

How to Prioritize Security Tasks When You Have Limited Resources

by Travis Wilkins , posted in Continuous Security Monitoring, Automation, Cloud Security Maturity Model, AWS Configuration Auditing, Visibility

Security Tasks Blog Banner.png

Many organizations have limited resources (time, personnel, and money) for IT, and oftentimes only a small portion of that is devoted to security. Given the limited resources available to create and execute a best practice security plan, you will need to face up to these constraints and prioritize security tasks.

But how, exactly, should you go about strategically prioritizing your security needs? How can you determine which aspects need to be addressed first and which can be dealt with later? After all, aren’t they all important?

Read More [fa icon=long-arrow-right"]

Jun 7, 2017 11:08:48 AM

[fa icon="comment"] 0 Comments

5 Key Takeaways From DevOpsDays Austin 2017

by Travis Wilkins , posted in Cloud Security, DevOpsDays Austin 2017

DevOpsDays Austin Recap 2017 Blog Banner.png

Once again Threat Stack was pleased to be a sponsor and a participant at DevOpsDays Austin 2017 on May 4 & 5. Right off the bat it’s clear that this vibrant conference is continuing to expand, with its year over year increase in the number of attendees (650) and sponsors (40). Of particular note: The importance that people in the DevOps space are placing on security is definitely continuing to grow — and I put together five key observations about security, compliance, and the way DevOps teams operate. So without further commentary, here’s what I learned at DevOps Days Austin.

Read More [fa icon=long-arrow-right"]

May 15, 2017 11:11:29 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all