Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

5 Tips to Streamline Your Security Team

by Chris Gervais , posted in Cloud Security, SecOps, Cyber Security, Optimizing Security Operations, Optimizing Security Teams

Streamline Security Team Blog Banner.png

If you’ve ever hired security pros, then you know the current talent shortage is no joke. A recent Computerworld survey found that compensation for security specialists is growing faster than for any other role in IT (up 6.4% year-over-year in average total compensation), and the competition for talent is fierce. Finding the right talent can be a lengthy process, leaving your security hopes and dreams in limbo.

So, what’s an organization to do? Many companies are working hard to streamline security operations and answer the talent shortage with changing tactics to match the changing role of security. Organizations need to maximize the value of their security hires now more than ever. Below, we’ll cover five tips that can help you get the most out of your security team’s time and talents.

Read More [fa icon=long-arrow-right"]

Mar 3, 2017 1:45:52 PM

[fa icon="comment"] 0 Comments

Where to Find Security Talent & How to Keep Them Happy

by Tim Armstrong , posted in Cyber Security, Internships, Recruiting

Where to Find Security Talent Blog Banner.jpg

It’s no secret that there’s a huge talent shortage in the security space today. With a low supply and high demand, salaries have surged, increasing 6.4% from 2015 to 2016. (That’s an even higher salary growth than software engineers are seeing.) And there is no end in sight. For companies that recognize how important it is to keep information and systems secure in today’s business climate, it’s important to find workable strategies for hiring and retaining security talent in spite of this shortage.

While most organizations would benefit by developing a full-fledged, multi-faceted recruiting and retention strategy, we want to share a few more tactical ways to help bridge the talent gap in the shorter term.

Read More [fa icon=long-arrow-right"]

Dec 7, 2016 9:49:44 AM

[fa icon="comment"] 0 Comments

The Point Security Solution Implosion: 4 Things Companies Need to Know

by Palen Schwab , posted in Cloud Security, Cyber Security, Security Strategy


Not even a decade ago, security was much simpler. Companies were defined by the perimeter of their corporate network and protected by a firewall and antivirus tool that could withstand just about any security attack. Then came the cloud, mobile devices, and the Internet of Things (IoT), and the attack surface overflowed far beyond the network, making security not-so-simple.

Read More [fa icon=long-arrow-right"]

Jun 9, 2016 11:17:48 AM

[fa icon="comment"] 0 Comments

Turn the Cyber Kill Chain against your attacker

by Brian Ahern , posted in Cloud Security, Cyber Security, Cyber Kill Chain


As businesses move to the cloud, the rapid adoption of Infrastructure as a Service (IaaS) is no surprise. Unfortunately, securing the cloud and the data within it is no easy task. The speed and complexity of cloud computing requires a new, software-defined approach that differs from the strategies employed in a traditional, on-premise data center, leaving many wondering where to start.

For all the benefits that the cloud has to offer, some of the biggest causes for concern are questions around security. How do you know if you were breached if the server no longer exists? How do you protect yourself from insider threats, external attacks, and data loss in this new elastic, ever changing infrastructure? How can you have confidence that your cloud service providers security capabilities are up to snuff, when you don’t have visibility into who is accessing your data?

Look no further than the headlines to know that efforts to protect the cloud from attacks often fail. After attackers compromised the company's Amazon Web Services (AWS) account, Code Spaces, a cloud-based hosting platform that enabled development and collaboration for software teams, was forced out of business. Within 12 hours the company's Apache Subversion repositories and Elastic Block Store volumes and nearly all of its virtual machines were destroyed. By the time the company reclaimed its dashboard, the attackers had created alternative AWS logins, questioning the overall security of the system further. The company chose at that point to shut down and help its customers migrate any recoverable data to other services.

With hindsight we can ask ourselves, what could Code Spaces have done to stop this type of attack? Were there steps it could have taken beforehand to prevent the breach? Were there ways Code Spaces could have slowed down the attack or stopped it in its tracks?

In an era when attacks are becoming more sophisticated and motivations are harder to pin down, organizations must employ strategies to protect against threats to their cloud infrastructure. One such strategy is to defend like an attacker. Created by Lockheed Martin, the “Cyber Kill Chain” model has traditionally been used to describe the evolving stages of a cyber attack. However, if this model is applied to internal security processes it’s possible for an organization to identify a compromise and eliminate threats before they result in a security breach and data loss that could potentially bring down the entire business, like in the case of Code Spaces.

By approaching the security of your cloud with the mindset of an attacker, you will be able to uncover weak spots and employ more effective defense strategies. Let’s take a look at each step of the Cyber Kill Chain and get into the mindset of an attacker.

1. Reconnaissance

During the reconnaissance step an attacker gathers information before starting the actual attack. This can be done by looking for publically available information on the Internet in order to find a target that has vulnerabilities that can be compromised; or by seeing what vulnerabilities exist within the cloud infrastructure of a specific organization.

Read More [fa icon=long-arrow-right"]

Dec 9, 2015 12:18:42 PM

[fa icon="comment"] 0 Comments

Oct 30, 2015 4:52:19 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all