Can security and compliance for managed database services be simple?

Actual Tech Media recently released a new entry in its Gorilla Guide series for IT professionals, focused on simplifying security and compliance for Database as a Service (DBaaS). The Gorilla Guide To® Securing Database as a Service (DBaaS) features Im… Continue reading Can security and compliance for managed database services be simple?

Ensuring Security and Compliance in AWS RDS with CDS

If you use AWS RDS, your organization is part of a worldwide trend. Forward-thinking companies everywhere are embracing database-as-a-service (DBaaS) to help bring new applications and services to market faster, or to reduce the cost and complexity of … Continue reading Ensuring Security and Compliance in AWS RDS with CDS

Meet Threat Stack at AWS re:Invent 2019

Join Threat Stack at re:Invent 2019 December 2–5 Sands Expo Convention Center Las Vegas, NEV AWS re:Invent 2019 fires up on Monday, December 2, and it’s going to be a fantastic show. Once again, Threat Stack is a proud sponsor, and we&#8217… Continue reading Meet Threat Stack at AWS re:Invent 2019

Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster

The post Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster appeared first on Delta Risk.
The post Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster appeared first on Security Boulevard.
Continue reading Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster

AWS re:Inforce 2019 Recap: A Look Back at the First AWS Security Show

The last day of the first AWS re:Inforce conference has wrapped up and it’s time to take the lessons we learned back to the office and put them into practice. In this post, we’ve compiled a few of the key takeaways from our team on the grou… Continue reading AWS re:Inforce 2019 Recap: A Look Back at the First AWS Security Show

Your Guide to AWS re:Inforce 2019

AWS re:Inforce 2019 | June 25–26, 2019 | Boston, MA Attending cloud security conferences is critical for cloud security professionals, and AWS is stepping up to the plate with AWS re:Inforce — its first-ever conference focuse… Continue reading Your Guide to AWS re:Inforce 2019

7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same can complicate the process of selecting one that’s right for your organization. Selecting CSPs becomes even more comp… Continue reading 7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same can complicate the process of selecting one that’s right for your organization. Selecting CSPs becomes even more comp… Continue reading 7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

How to Track Agent-Based User Activity

More often than not we’ll need to go beyond a Severity 1 alert to figure out what a user (including a potentially malicious attacker) was doing on a system. Host events in particular only show a small part of the picture, and a single alert can&#… Continue reading How to Track Agent-Based User Activity