Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Eyes on the Ground: Why You Need Security Agents

by Nathan Cooprider , posted in HIDS, Agent Fatigue, Security Agents

Security Agents Blog Banner.png

A post based on the talk I just gave at SOURCE Boston 2017

If you answer Yes to one or more of the following questions, you probably have agent fatigue! Do not worry, I'm here to help and we can work through this.

  • Do you often find yourself booting into safe mode?
  • Do you regularly look for programs in the taskbar to kill?
  • Do you look for reasons why your computer seems so sluggish after IT did something to it?
  • Do you wonder why you even pay for that thing on your computer?
  • Do you have employees who complain about installed software?
  • Do you look for ways to meet compliance requirements in software?
  • Do you care about security?
Read More [fa icon=long-arrow-right"]

Apr 28, 2017 11:56:47 AM

[fa icon="comment"] 0 Comments

MineralTree Achieves PCI Compliance With Threat Stack

by Kevin Eberman , posted in Compliance, File Integrity Monitoring, PCI DSS, HIDS, Compliance Audit, Vulnerability Monitoring

Customer Post MineralTree Blog Banner.jpg

Compliance processes have a reputation for being expensive, time-consuming, and fraught with difficulties — and sometimes certifications are looked upon with skepticism. However, most of the PCI requirements are common sense, best practices that any organization that is concerned with security should adopt. At MineralTree, we use Threat Stack to mitigate security threats. Additionally Threat Stack helps us adhere to PCI requirements and document our compliance.

Let me explain  . . .

Read More [fa icon=long-arrow-right"]

Jan 9, 2017 10:10:30 AM

[fa icon="comment"] 0 Comments

Threat Stack Cloud Security Platform: Streamlined Workflows, Part 2

by Megan Rees Ahigian , posted in Cloud Security, Threat Stack Cloud Security Platform, HIDS, Workflow Enhancements, Server Management, Software Vulnerability Assessment & Management

CSP Streamlined Workflow Part2.jpg

In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security platform with all the features users need to keep their cloud environments protected as they scale.

More recently, we have focused on our second goal — streamlining workflows in three key areas of our Cloud Security Platform® — to ensure that it is easy to use and customize, thus enabling users to move as fast as possible while they prioritize security issues and strengthen their organization’s security.

In Part 1 of this series I explained how we streamlined our Host Intrusion Detection (HIDS) workflows. In Part 2, I am going to describe improvements we’ve made to workflows in the following two areas:

  • Server Management
  • Software Vulnerability Assessment and Management

Read More [fa icon=long-arrow-right"]

Nov 30, 2016 11:31:06 AM

[fa icon="comment"] 0 Comments

Threat Stack Cloud Security Platform: Streamlined Workflows, Part 1

by Megan Rees Ahigian , posted in Cloud Security, Threat Stack Cloud Security Platform, HIDS, Workflow Enhancements

CSP Streamlined Workflows Blog Banner.jpg

At Threat Stack, we have two high-level goals when it comes to product development. First, we want to continue to build a powerful, cloud-based security platform with all the features users need to keep their cloud environment protected as they scale. And second, we want to create a platform that’s easy to use and customize, so users can move as fast as possible and also strengthen their organization’s security.

In the first part of 2016 we put a large effort into the first goal, increasing the breadth and depth of our feature set, including vulnerability assessment, more powerful investigative tools, etc. Recently we have focused heavily on the second goal, streamlining workflows in three areas of our Cloud Security Platform®:

  • Host Intrusion Detection (HIDS) Rules Management
  • Management of Servers protected by Threat Stack
  • Software Vulnerability Assessment and Management

In this post, I’ll discuss how users can customize HIDS using the streamlined rules management functionality. In a follow-up post, I will talk about streamlined workflows that are now available for server management and software vulnerability assessment and management.

Read More [fa icon=long-arrow-right"]

Nov 16, 2016 11:38:58 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all
REGISTER NOW

-->