Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

How to Create an Effective Cloud Security Alerting Process

by Venkat Pothamsetty , posted in Cloud Security Playbook, Cloud Security Strategy, Cloud Security Platform, Cloud Security Alerting System


The first component of any security program should be an alert system. Alerts are typically the fastest and most effective way to be notified when something goes wrong so you can jump into action. But alerts also have the stigma of being too noisy, throwing out false positives, or requiring a lot of fine tuning to get right. After all, a minor bug in the code that doesn’t affect end users isn’t the type of thing you should be woken up in the middle of the night for.

Read More [fa icon=long-arrow-right"]

May 26, 2016 11:45:17 AM

[fa icon="comment"] 0 Comments

Your Cloud Security Goals: Where to Start?

by Venkat Pothamsetty , posted in Cloud Security Playbook, Cloud Security Strategy, Cloud Security Goals

Goals.jpgWe’re willing to assume that cloud security is important to your company, but proactively building and implementing a strategy to make it happen is often bypassed in favor of a more reactive and tactical approach to cloud security.

Read More [fa icon=long-arrow-right"]

May 18, 2016 11:05:18 AM

[fa icon="comment"] 0 Comments

A Guide to Assess Where You Stand With Cloud Security

by Palen Schwab , posted in Cloud Security, Cloud, Cloud Security Playbook


Cloud security is a sprint and a marathon. A sprint in that security teams must quickly put the right defenses in place to address zero-day attacks and persistent threats in the short term, and a marathon in that an organization's security posture needs to be regularly evaluated and improved on over the long term to address new and evolving threats and compliance regulations.

Read More [fa icon=long-arrow-right"]

May 12, 2016 6:07:23 PM

[fa icon="comment"] 0 Comments

How to Get Buy-In for Your Cloud Security Strategy

by Venkat Pothamsetty , posted in Cloud Security Playbook, Cloud Security Strategy


“All men can see these tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved.” – Sun Tzu

Ah, team buy-in. It’s often one of the toughest processes to go through! Getting the green light on a new cloud security strategy (including the workflows, tools, and processes that go along with it) can require several layers of definition and validation, and often times, security teams are just too busy to fight the battle and see it through to the end. When it comes to implementing better cloud security practices, however, there is a real risk to delaying — or worse — giving up on your strategy because of a difficult approval process.

Read More [fa icon=long-arrow-right"]

May 6, 2016 8:29:24 AM

[fa icon="comment"] 0 Comments

How to Use SOSTAC to Build Your Security Strategy

by Venkat Pothamsetty , posted in Cloud Security Playbook, Cloud Security Strategy


Some people go to great lengths to find things to disagree about, but I think there’s one thing all of us can agree on: cloud security keeps us on our toes. That’s because the cloud requires a fundamental change in the way we approach security challenges. As the scale and complexity of cloud environments increase, traditional tools and tactics become less and less effective, and security gaps widen. That is, if you don’t have a sound security strategy in place. 

Read More [fa icon=long-arrow-right"]

Apr 26, 2016 5:14:28 PM

[fa icon="comment"] 0 Comments

Apr 13, 2016 2:59:15 PM

[fa icon="comment"] 0 Comments

How to Pick a Cloud Security Technology that Works for Everyone at Your Organization

by Venkat Pothamsetty , posted in Cloud Security, Cloud Security Playbook, Security Technology, Security Strategy


Does the ownership of security within your organization look like a disorganized football scrimmage with no clear offense or defense?

This is often the case since many organizations launch their cloud security programs in response to an acute pain point, such as a security incident or compliance obligation, without an overall strategy in place. Typically, whoever’s role that pain point affects most directly is put in charge of finding a solution to address it.

If your organization has taken this approach, you’re probably dealing with significant confusion around who owns what part of the security process. Chances are you’re also facing resource constraints, challenges and frustrations. And you’re probably hungry for a more organized and defined approach. Don’t worry. We have you covered.

Read More [fa icon=long-arrow-right"]

Feb 11, 2016 11:34:00 AM

[fa icon="comment"] 0 Comments

Are Any of These 6 Roadblocks Standing in the Way of Your Cloud Security?

by Venkat Pothamsetty , posted in Cloud Security, Cloud Security Playbook, Cloud Security Strategy


Sometimes it feels like achieving security in the cloud comes with more roadblocks than a presidential motorcade on Election Day. As the platforms, devices and compliance requirements proliferate, picking the right tool(s) for your specific company and industry turned into a really complicated ordeal. You have to deal with data that comes in every shape and size, individual privacy and compliance needs and the explosion of BYOD culture. Where to even start?

Building on last week’s post about getting your cloud security playbook in order, we wanted to share six of the most common cloud security roadblocks that we see companies running into over and over. Don’t worry, we’ve also got tips for overcoming them, so you can get your data locked down and get back to providing value for your customers. Read on...

Read More [fa icon=long-arrow-right"]

Feb 4, 2016 10:36:02 AM

[fa icon="comment"] 0 Comments

Strategy Before Tactics: Getting Your Cloud Security Playbook in Order

by Venkat Pothamsetty , posted in Cloud Security, Continuous Cloud Security, State of Cloud Security, Cloud Security Playbook



The conversations are evolving, the threats are advancing and the strategies are shifting. Cloud adoption has surged forward in recent years, with 93 percent of companies now using cloud technology in some form or another. But far less than that have a proper cloud security strategy in place, and that means they are vulnerable to threats. Here’s where cloud security stands today.

Read More [fa icon=long-arrow-right"]

Jan 29, 2016 11:25:11 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all