What is the NIST Cybersecurity Framework?

You’ve SOC 2-ed from here to eternity, and you’ve got GDPR in the bag, but if you’re truly focused on security maturity, you know that your work is never done. So, what’s next? Perhaps it’s time to focus on the National In… Continue reading What is the NIST Cybersecurity Framework?

How to Avoid Targeted AWS Attacks With Secure AWS Keys

If the headlines are any indication, hackers continue to exploit vulnerabilities in cloud infrastructure platforms, with targeted AWS attacks becoming very common. Many attacks follow similar patterns: Actors are typically looking opportunistically for… Continue reading How to Avoid Targeted AWS Attacks With Secure AWS Keys

Why DevOps Needs Security During an Infrastructure Transition

The rising popularity of DevOps practices in cloud infrastructure environments has allowed software teams to release work more quickly and efficiently than ever before, but is security top of mind? Data included in a new Pathfinder Report from 451 Rese… Continue reading Why DevOps Needs Security During an Infrastructure Transition

How to Use Threat Stack to Enable Proactive Security

We recently discussed some pretty sobering statistics in the world of cybersecurity, ranging from astronomical misconfiguration rates to the depressing lack of speed with which breaches are detected. Not only are attacks more sophisticated than ever be… Continue reading How to Use Threat Stack to Enable Proactive Security

Planning to Join the Other 50,000 Security Aficionados at Black Hat USA?

Secure the Strange Things Happening in Your Cloud Booth #2316 | August 8 – 9 | Las Vegas, NV Black Hat USA is coming up fast! So plan your activities now, starting with a visit to Booth #2316 where Threat Stack’s experts will be w… Continue reading Planning to Join the Other 50,000 Security Aficionados at Black Hat USA?

Three Homegrown SecOps Tools Used by the Threat Stack Team

As a security company, there’s a lot of pressure to keep our data secure while still moving fast and innovating on product development. I find the intersection of security and speed the most interesting challenge as an infrastructure security pro… Continue reading Three Homegrown SecOps Tools Used by the Threat Stack Team

101 AWS Security Tips & Quotes, Part 3: Best Practices for Using Security Groups in AWS

Here’s the third blog post in our 4-part series of AWS Security Tips and Quotes, which is designed to help you evolve and strengthen your organization’s security, building on a proactive, comprehensive security strategy. So far we’ve … Continue reading 101 AWS Security Tips & Quotes, Part 3: Best Practices for Using Security Groups in AWS

What is SecOps? A Definition, Benefits, Best Practices, and More

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps … Continue reading What is SecOps? A Definition, Benefits, Best Practices, and More