Top Compliance Pain Points by Industry

Whether you are adhering to mandatory regulations or voluntary cybersecurity frameworks, taking compliance seriously can be a huge boon to your organization. It can help you avoid costly penalties, signal to your customers that you’re serious abo… Continue reading Top Compliance Pain Points by Industry

Navigating and Evaluating Cloud Security Solutions

Cloud security is arguably the most rapidly changing technology landscape out there. Naturally, the market for security tools is also constantly evolving as organizations continue to develop an understanding of the importance of a mature security postu… Continue reading Navigating and Evaluating Cloud Security Solutions

How a DevOps Recruiter Hires for Containers and Serverless

A Q&A With Michael Race, Head of DevOps, Salt Digital Recruitment When it comes to hiring for DevOps, there’s much to consider, especially if you’re looking for someone to manage containers and serverless infrastructure. There’s n… Continue reading How a DevOps Recruiter Hires for Containers and Serverless

Lessons in Resilience: A Conversation on Security at REdeploy 2018

I spent last week out in San Francisco at REdeploy to learn about Resilience Engineering and what it means to build solid, sustainable infrastructures, organizations, and teams. This was the first conference of its type, and it did not disappoint. Whil… Continue reading Lessons in Resilience: A Conversation on Security at REdeploy 2018

Inside an AWS Breach: Intel From Multi-Step Breaches

Inside an AWS Breach Investigation What: An upcoming webinar with Threat Stack CSO Sam Bisbee who will walk through the steps of a recent AWS breach while discussing trends in the rising sophistication of AWS actors and how to monitor your own infrastr… Continue reading Inside an AWS Breach: Intel From Multi-Step Breaches

Security Observability: Operationalizing Data in Complex, Distributed Systems

It’s 2018 — companies are using multiple cloud providers, shifting to microservices, moving monoliths into containers, or maybe even moving to a serverless-style architecture. And while these are the trendy things to do right now, are they … Continue reading Security Observability: Operationalizing Data in Complex, Distributed Systems

What’s In Our SecOps Stack: 6 Top Integrations

When it comes to creating a solid SecOps program, an organization must consider people, processes, and technology. It’s not one area that makes a secure program, but a combination of all three working together. As good as our people are, however,… Continue reading What’s In Our SecOps Stack: 6 Top Integrations

How to Find and Remediate Open Infrastructure Ports

The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave your organization at risk for security breaches. For example, in July 2018, an open S3 bucket at a … Continue reading How to Find and Remediate Open Infrastructure Ports

50 Best Cloud Security Training Resources

The bad news is there’s a global shortage of trained cybersecurity professionals: According to PWC, there will be 1.5 million cybersecurity job openings by 2019, and the talent market is not expected to catch up any time soon. The good news is th… Continue reading 50 Best Cloud Security Training Resources