8 Best Practices for Strengthening Security in Cloud-Native Environments

8 Best Practices for Strengthening Security in Cloud-Native Environments

Cloud-native companies and larger companies migrating to cloud environments continue to see the cloud as a way to gain speed, reliability, and other well-known benefits. But there are still plenty of pitfalls that can undermine security and negatively impact operations. To help remedy this situation, this post outlines some of ... Read More
The Top 3 Security Mistakes SaaS Companies are Making

The Top 3 Security Mistakes SaaS Companies are Making

The more data you store, the more attractive you become to cybercriminals, so SaaS companies need to recognize the importance of following security best practices. However, even those who understand this imperative can find it difficult to know where to start. With that in mind, this post discusses three of ... Read More
AWS GDPR: What You Need to Know

AWS GDPR: What You Need to Know

In May 2018, the General Data Protection Regulation became enforceable. While it is largely a European Union regulation, you are still covered by it if you store or process personal information of EU citizens. If you use Amazon Web Services, you already know about many of the common security issues ... Read More
Leveraging Threat Stack’s Out-of-the-Box Rulesets and Single View for Managing Multiple AWS Accounts

Leveraging Threat Stack’s Out-of-the-Box Rulesets and Single View for Managing Multiple AWS Accounts

Increasingly, AWS users are leveraging multiple accounts to manage their infrastructure. While doing so is a recommended best practice that enables users to achieve the highest levels of resource and security isolation and to optimize operational costs, it can also increase the amount of time and effort required for effective ... Read More
What is Cloud Workload Security?

What is Cloud Workload Security?

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a container, among other things. Broadly speaking, therefore, cloud workload security is any means of protecting these workloads. There is a ... Read More
How to Find and Remediate Open Infrastructure Ports

How to Find and Remediate Open Infrastructure Ports

The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave your organization at risk for security breaches. For example, in July 2018, an open S3 bucket at a political autodial company, Robocent, exposed nearly 2,600 ... Read More

Secure Guardrails