Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

According to Our Readers: Threat Stack’s Top 10 Blog Posts for 2016 (and More)

by Tim Armstrong , posted in Cloud Security, Compliance, AWS Security, SOC 2, Cassandra, Top Blog Posts, Whitelisting, System Upgrades, webpack, Scala, Post-Mortems, Rogue One

Top 10 Blog Banner.jpg

One of our goals at Threat Stack is sharing information that will help you learn about the current cloud security threat landscape in order to effectively and more easily manage your organization’s security issues — and confidently get on with running your business.

To this end, the Threat Stack blog is a terrific repository of articles that cover a range of security topics. If you’re not a regular reader, we encourage you to start exploring — and in the meantime, have a look at the ten most-read posts of 2016.

Read More [fa icon=long-arrow-right"]

Dec 28, 2016 9:42:20 AM

[fa icon="comment"] 0 Comments

4 Things You Need to Know About SOC 2 Compliance

by Vikram Varakantam , posted in Compliance, SOC 2

SOC 2 Compliance Blog Banner.jpg

Compliance isn’t as simple as a connect-the-dots exercise. When you consider how fast companies are moving to and expanding on the cloud, alongside the proliferation of cloud-based security threats, compliance can be a little dizzying. We’re here to break the complexities of compliance requirements down for you, starting with SOC 2.

SOC 2 is one of the more common compliance requirements technology companies must meet today.

So what does SOC 2 compliance mean and how can you go about achieving it? In this post, we will break down the four most important things you need to know.  

Read More [fa icon=long-arrow-right"]

Mar 31, 2016 12:20:59 PM

[fa icon="comment"] 0 Comments

New Case Study:
Protecting Customer Data & Meeting SOC 2 Compliance

by Palen Schwab , posted in Compliance, Customers, SOC 2, Continuous Cloud Security

We recently spoke with Threat Stack customer Jameel Al-Aziz, DevOps/Software Engineer for 6sense, and developed the below case study that showcases how Al-Aziz and his team are using Threat Stack. Al-Aziz also details in the case study the company-wide benefits they are realizing, including a shortened sales cycle, by having a continuous security monitoring solution in place. Below is their story.

Read More [fa icon=long-arrow-right"]

Apr 21, 2015 10:26:47 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all