Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

7 Signs Your Business Should Outsource Cloud Security

by Palen Schwab , posted in Threats, Cloud Security, Security, Threat Detection, Operations, Alerts, Cloud, Operational Efficiency, Oversight


The business benefits of moving to the cloud are myriad, from
increased efficiency to reduced costs and even expanded business opportunities. And while there has been some circulating fear around how secure a business’s data can really be in the cloud, a recent study found that 94 percent of businesses actually saw an improvement in their security posture after moving to the cloud.

Of course, moving your data and systems to the cloud isn’t risk-free, as the many data breaches that have graced the news over the last few years prove. If you want to benefit from the cloud but not open yourself up to all kinds of vulnerability, you need to invest in security.

Read More [fa icon=long-arrow-right"]

Dec 8, 2015 4:21:09 PM

[fa icon="comment"] 0 Comments

Who Watches the Watchmen? Securing Configuration Management Systems

by Jen Andre , posted in Security, DevOps, Operations, Configuration Management


This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations pipelines from a security perspective.   

Read More [fa icon=long-arrow-right"]

Feb 24, 2015 9:41:00 AM

[fa icon="comment"] 0 Comments

Who Gets Access to Production?

by Sam Bisbee , posted in Production, Security, DevOps, Policy, SecDevOps, Operations, SecOps

This is the third installment in our new series of weekly blog posts that dives into the role of SecDevOps. This series looks into why we need it in our lives, how we may go about implementing this methodology, and real life stories of how SecDevOps can save the Cloud.

Read More [fa icon=long-arrow-right"]

Jul 23, 2014 4:56:00 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all