Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Invest in Security Using a 4 Point Plan

by Kevin Durkin, posted in Cloud Security, Cloud Security Strategy, Cloud Security Technologies

4_Point_Security_Plan_Blog_Bannerv3.jpg

In an earlier blog post I wrote about looking at security as an investment (as opposed to an expense), focusing on the value that an integrated cloud-native security platform can deliver to investors, board members, and C-Level executives. In this post, I’m going to broaden my focus to include some of the other issues you need to include in your “security as an investment” plan.

Read More [fa icon=long-arrow-right"]

Sep 23, 2016 4:27:57 PM

[fa icon="comment"] 0 Comments

A Blueprint for Selecting Security Technologies Inside the Cloud

by Venkat Pothamsetty, posted in Cloud Security, Cloud Security Strategy, Cloud Security Platform, Cloud Security Technologies

blueprint-blog-banner.jpg

Cloud security operations teams, especially ones that are looking at security technologies for the first time, are often faced with a daunting list of vendors who offer technologies with wide-ranging capabilities. Understanding the pros and cons of each might seem difficult or impossible at first, especially because the enterprise security sector is inundated with technologies that address security from a defense in depth perspective, offering different technologies at each layer. These include Firewalls, VPNs, IDS, IPS, log collection tools, SIEM tools, routers and switches with security capabilities, endpoint security tools, vulnerability management tools, threat management tools, etc.

Read More [fa icon=long-arrow-right"]

Sep 1, 2016 3:07:56 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all