Threat Stack Launches New Unified Application Security Monitoring Solution

Threat Stack’s Application Security Monitoring enables cloud security observability across the full stack & full lifecycle in a single solution Even when companies have a formal software security team, the ratio of security team members to de… Continue reading Threat Stack Launches New Unified Application Security Monitoring Solution

Defining the “Full Stack” in Full Stack Security Observability

Here at Threat Stack, we’ve been talking a lot about security observability recently (check out this article and whitepaper). When you design and monitor your systems for security observability, you reduce risk and minimize the likelihood and pot… Continue reading Defining the “Full Stack” in Full Stack Security Observability

Cloud Security Observability: How to Reduce Risk in Your Cloud-Native Infrastructure

Security Observability has become an important concept recently as companies have started building software with a cloud-native mindset, embracing distributed, immutable, and ephemeral systems. As infrastructure has shifted from traditional deployment … Continue reading Cloud Security Observability: How to Reduce Risk in Your Cloud-Native Infrastructure

Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take

Modern healthcare is a full participant in the digital economy, and personal health information (PHI) is at its center. But today’s digital landscape is a volatile threat environment where sensitive personal data is a coveted commodity. Minimizin… Continue reading Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take

7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same can complicate the process of selecting one that’s right for your organization. Selecting CSPs becomes even more comp… Continue reading 7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same can complicate the process of selecting one that’s right for your organization. Selecting CSPs becomes even more comp… Continue reading 7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

How to Achieve Full Stack, Multi-Cloud Security Observability

You probably know AWS as the leading cloud platform provider. These days, however, many companies are using additional cloud providers as well. According to Gartner’s October 2018 report “Market Insight: Multicloud Becomes Essential for Clo… Continue reading How to Achieve Full Stack, Multi-Cloud Security Observability

How to Track Agent-Based User Activity

More often than not we’ll need to go beyond a Severity 1 alert to figure out what a user (including a potentially malicious attacker) was doing on a system. Host events in particular only show a small part of the picture, and a single alert can&#… Continue reading How to Track Agent-Based User Activity

How to Understand Your Attacker’s Mindset

In this post we’ll try to develop an understanding of a typical attacker’s mindset and then show you how companies like yours can use this knowledge to enhance their security posture. Before we dive in, however, let’s ask a basic ques… Continue reading How to Understand Your Attacker’s Mindset