Transforming Alert Fatigue Into Proactive Security Management

In a recent study, 72% of CISOs stated that their teams are facing alert fatigue, while 82% of respondents to a Threat Stack survey indicated that alert fatigue is having a negative impact on their organization’s well-being and productivity. Trad… Continue reading Transforming Alert Fatigue Into Proactive Security Management

AWS Security Groups: What They Are and How to Get the Most Out of Them

AWS Security Groups are a flexible tool to help you secure your Amazon EC2 instances. AWS Security Groups are just one of several tools AWS offers to help you secure your cloud environment, but that doesn’t mean AWS security is hands-off. You&#82… Continue reading AWS Security Groups: What They Are and How to Get the Most Out of Them

Threat Stack Introduces Bulk Data Export Feature

One of the biggest benefits of the Threat Stack Cloud Security Platform® is the deep level of visibility we bring to observing operator behaviors in customers’ cloud runtime environments. We frame this discussion in terms of “security … Continue reading Threat Stack Introduces Bulk Data Export Feature

9 Core & Specialty AWS Security Certifications

Cloud computing has become a necessity for almost all businesses. Given this reality, there is a significant need to design, develop, deploy, manage, and secure workloads in the cloud. AWS offers a multitude of certifications, and having relevant certi… Continue reading 9 Core & Specialty AWS Security Certifications

Threat Stack Announces New and Enhanced CloudTrail Rules

As AWS continues to expand its services landscape, Threat Stack has made a commitment to keeping in step by crafting additional coverage that keeps your cloud environment secure. The latest additions we’ve made to Threat Stack’s CloudTrail … Continue reading Threat Stack Announces New and Enhanced CloudTrail Rules

Threat Stack Announces New and Enhanced CloudTrail Rules

As AWS continues to expand its services landscape, Threat Stack has made a commitment to keeping in step by crafting additional coverage that keeps your cloud environment secure. The latest additions we’ve made to Threat Stack’s CloudTrail … Continue reading Threat Stack Announces New and Enhanced CloudTrail Rules

AWS re:Invent 2018 Recap: Security, DevOps, ML, & Hybrid Cloud Take Center Stage

Another year at AWS re:Invent has come and gone. As usual it was a jam packed show full of exciting announcements, great keynotes, sessions, and interesting conversations. In case you couldn’t make it to Vegas this year or could use a summary of … Continue reading AWS re:Invent 2018 Recap: Security, DevOps, ML, & Hybrid Cloud Take Center Stage

Three Old-School Network Security Tips That (Still!) Work for Modern Infrastructure

The adage “Everything old is new again,” rings true in the cybersecurity industry as much as anywhere else. Some of the best practices from old-school network security still apply to modern virtual server or containerized environments. Even… Continue reading Three Old-School Network Security Tips That (Still!) Work for Modern Infrastructure

Introducing Threat Stack’s New Podcast: “Your System Called”

That’s right. The tl;dr is that Threat Stack is launching a podcast series called Your System Called — and I’ll be hosting it. You can access the podcast on iTunes, subscribe via RSS, or preview the first two episodes below…. Continue reading Introducing Threat Stack’s New Podcast: “Your System Called”