Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster

The post Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster appeared first on Delta Risk ...
AWS re:Inforce 2019 Recap: A Look Back at the First AWS Security Show

AWS re:Inforce 2019 Recap: A Look Back at the First AWS Security Show

The last day of the first AWS re:Inforce conference has wrapped up and it’s time to take the lessons we learned back to the office and put them into practice. In this ...
AWS re:Inforce 2019 — Day 1 Recap

AWS re:Inforce 2019 — Day 1 Recap

Day 1 of AWS re:Inforce 2019 — the first-ever AWS conference dedicated entirely to security — has wound down, and Day 2 is already underway, but we wanted to provide a quick ...
Your Guide to AWS re:Inforce 2019

Your Guide to AWS re:Inforce 2019

AWS re:Inforce 2019 | June 25–26, 2019 | Boston, MA Attending cloud security conferences is critical for cloud security professionals, and AWS is stepping up to the plate with AWS re:Inforce — ...
7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same can complicate the process of selecting one that’s right ...
How to Track Agent-Based User Activity

How to Track Agent-Based User Activity

More often than not we’ll need to go beyond a Severity 1 alert to figure out what a user (including a potentially malicious attacker) was doing on a system. Host events in ...
Transforming Alert Fatigue Into Proactive Security Management

Transforming Alert Fatigue Into Proactive Security Management

In a recent study, 72% of CISOs stated that their teams are facing alert fatigue, while 82% of respondents to a Threat Stack survey indicated that alert fatigue is having a negative ...
Leveraging Threat Stack’s Out-of-the-Box Rulesets and Single View for Managing Multiple AWS Accounts

Leveraging Threat Stack’s Out-of-the-Box Rulesets and Single View for Managing Multiple AWS Accounts

Increasingly, AWS users are leveraging multiple accounts to manage their infrastructure. While doing so is a recommended best practice that enables users to achieve the highest levels of resource and security isolation ...
AWS Security Readiness Checklist

AWS Security Readiness Checklist

This AWS Security Readiness Checklist is intended to help organizations evaluate their applications and systems before deployment on AWS. This evaluation is based on a series of best practices and is built ...
AWS Security Groups: What They Are and How to Get the Most Out of Them

AWS Security Groups: What They Are and How to Get the Most Out of Them

AWS Security Groups are a flexible tool to help you secure your Amazon EC2 instances. AWS Security Groups are just one of several tools AWS offers to help you secure your cloud ...